Bug 1536011
| Summary: | ns-slapd: tlsmc_cert_create_hash_symlink: ERROR: OS error: Permission denied | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Sudhir Menon <sumenon> |
| Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> |
| Status: | CLOSED ERRATA | QA Contact: | Milos Malik <mmalik> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 7.5 | CC: | jreznik, lslebodn, lvrabec, mgrepl, mhonek, mmalik, mthacker, nkinder, plautrba, rmeggins, ssekidde, sumenon |
| Target Milestone: | rc | Keywords: | Reopened |
| Target Release: | --- | ||
| Hardware: | Unspecified | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2018-04-10 12:49:36 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Sudhir Menon
2018-01-18 12:52:59 UTC
The function tlsmc_cert_create_hash_symlink() is not in the 389-ds-base source code. It's in some other package, perhaps nss, or openldap? tlsmc_cert_create_hash_symlink() comes from openldap, but denials are likely because of the missing selinux permissions for ns-slapd. Sudhir, could you please also provide selinux denials? Thanks! Please use following command when collecting SELinux denials: # ausearch -m avc -m user_avc -m selinux_err -m user_selinux_err -i -ts today [root@master ~]# ausearch -m avc -m user_avc -m selinux_err -m user_selinux_err -i -ts today
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.379:234) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=2) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.464:235) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=3) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.029:237) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=2) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.029:238) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=3) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.336:247) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=4) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.002:248) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=4) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.360:360) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=5) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.386:361) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=6) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.462:363) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=5) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.462:364) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=6) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.913:365) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.913:365) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=17805 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.913:365) : avc: denied { block_suspend } for pid=17805 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.913:366) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.913:366) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=17805 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.913:366) : avc: denied { block_suspend } for pid=17805 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.914:367) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.914:367) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=17805 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.914:367) : avc: denied { block_suspend } for pid=17805 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.915:368) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.915:368) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=17805 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.915:368) : avc: denied { block_suspend } for pid=17805 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.043:387) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.043:387) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=18320 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.043:387) : avc: denied { block_suspend } for pid=18320 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.043:388) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.043:388) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=18320 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.043:388) : avc: denied { block_suspend } for pid=18320 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.044:389) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.044:389) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=18320 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.044:389) : avc: denied { block_suspend } for pid=18320 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.044:390) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.044:390) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=18320 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.044:390) : avc: denied { block_suspend } for pid=18320 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.768:430) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.768:430) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=19018 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.768:430) : avc: denied { block_suspend } for pid=19018 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.768:431) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.768:431) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=19018 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.768:431) : avc: denied { block_suspend } for pid=19018 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.769:432) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.769:432) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=19018 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.769:432) : avc: denied { block_suspend } for pid=19018 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.769:433) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.769:433) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=19018 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.769:433) : avc: denied { block_suspend } for pid=19018 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.407:470) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=7) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.442:472) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=8) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.515:473) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=7) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.515:474) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=8) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.307:571) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=9) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.338:572) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=10) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.415:574) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=9) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.415:575) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=10) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.848:576) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.848:576) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=10801 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.848:576) : avc: denied { block_suspend } for pid=10801 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.848:577) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.848:577) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=10801 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.848:577) : avc: denied { block_suspend } for pid=10801 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.849:578) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.849:578) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=10801 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.849:578) : avc: denied { block_suspend } for pid=10801 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.849:579) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.849:579) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=10801 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.849:579) : avc: denied { block_suspend } for pid=10801 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.689:598) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.689:598) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=11320 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.689:598) : avc: denied { block_suspend } for pid=11320 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.689:599) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.689:599) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=11320 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.689:599) : avc: denied { block_suspend } for pid=11320 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.690:600) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.690:600) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=11320 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.690:600) : avc: denied { block_suspend } for pid=11320 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.690:601) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.690:601) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=11320 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.690:601) : avc: denied { block_suspend } for pid=11320 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.390:643) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.390:643) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=12019 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.390:643) : avc: denied { block_suspend } for pid=12019 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.390:644) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.390:644) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=12019 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.390:644) : avc: denied { block_suspend } for pid=12019 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.391:645) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.391:645) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=12019 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.391:645) : avc: denied { block_suspend } for pid=12019 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.391:646) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.391:646) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=12019 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.391:646) : avc: denied { block_suspend } for pid=12019 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.999:735) : proctitle=/usr/sbin/ns-slapd -D /etc/dirsrv/slapd-TESTRELM-TEST -i /var/run/dirsrv/slapd-TESTRELM-TEST.pid
type=PATH msg=audit(Thursday 18 January 2018 �Q1.999:735) : item=2 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--F395DF5EEC607E45D689F3C1BEA9B5C7B81B070140527E254E54A2886467A026/cacerts/517c6459.0 objtype=CREATE cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.999:735) : item=1 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--F395DF5EEC607E45D689F3C1BEA9B5C7B81B070140527E254E54A2886467A026/cacerts/ inode=25276902 dev=fd:01 mode=dir,700 ouid=dirsrv ogid=dirsrv rdev=00:00 obj=system_u:object_r:dirsrv_tmp_t:s0 objtype=PARENT cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.999:735) : item=0 name=cert0.pem objtype=UNKNOWN cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=CWD msg=audit(Thursday 18 January 2018 �Q1.999:735) : cwd=/var/log/dirsrv/slapd-TESTRELM-TEST
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.999:735) : arch=x86_64 syscall=symlink success=no exit=EACCES(Permission denied) a0=0x558ef77e8cf2 a1=0x558ef77e8d20 a2=0x0 a3=0x7fccca0412d9 items=3 ppid=1 pid=19031 auid=unset uid=dirsrv gid=dirsrv euid=dirsrv suid=dirsrv fsuid=dirsrv egid=dirsrv sgid=dirsrv fsgid=dirsrv tty=(none) ses=unset comm=ns-slapd exe=/usr/sbin/ns-slapd subj=system_u:system_r:dirsrv_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.999:735) : avc: denied { create } for pid=19031 comm=ns-slapd name=517c6459.0 scontext=system_u:system_r:dirsrv_t:s0 tcontext=system_u:object_r:dirsrv_tmp_t:s0 tclass=lnk_file
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.148:804) : proctitle=/usr/sbin/ns-slapd -D /etc/dirsrv/slapd-TESTRELM-TEST -i /var/run/dirsrv/slapd-TESTRELM-TEST.pid
type=PATH msg=audit(Thursday 18 January 2018 �Q1.148:804) : item=2 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--BFA544AED913F88D2E6BF5DB2051EAAA3B4C829545A4A97DDD20E228E8A1D85A/cacerts/517c6459.0 objtype=CREATE cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.148:804) : item=1 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--BFA544AED913F88D2E6BF5DB2051EAAA3B4C829545A4A97DDD20E228E8A1D85A/cacerts/ inode=58755315 dev=fd:01 mode=dir,700 ouid=dirsrv ogid=dirsrv rdev=00:00 obj=system_u:object_r:dirsrv_tmp_t:s0 objtype=PARENT cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.148:804) : item=0 name=cert0.pem objtype=UNKNOWN cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=CWD msg=audit(Thursday 18 January 2018 �Q1.148:804) : cwd=/var/log/dirsrv/slapd-TESTRELM-TEST
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.148:804) : arch=x86_64 syscall=symlink success=no exit=EACCES(Permission denied) a0=0x5568fab05792 a1=0x5568fab054a0 a2=0x0 a3=0x7f5dac67d2d9 items=3 ppid=1 pid=22285 auid=unset uid=dirsrv gid=dirsrv euid=dirsrv suid=dirsrv fsuid=dirsrv egid=dirsrv sgid=dirsrv fsgid=dirsrv tty=(none) ses=unset comm=ns-slapd exe=/usr/sbin/ns-slapd subj=system_u:system_r:dirsrv_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.148:804) : avc: denied { create } for pid=22285 comm=ns-slapd name=517c6459.0 scontext=system_u:system_r:dirsrv_t:s0 tcontext=system_u:object_r:dirsrv_tmp_t:s0 tclass=lnk_file
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.057:818) : proctitle=/usr/sbin/ns-slapd -D /etc/dirsrv/slapd-TESTRELM-TEST -i /var/run/dirsrv/slapd-TESTRELM-TEST.pid
type=PATH msg=audit(Thursday 18 January 2018 �Q1.057:818) : item=2 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--2E9834F5B0D38DAE42086A7D6552937CD0105DB06C17B3527902A17BCC2DC1E5/cacerts/517c6459.0 objtype=CREATE cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.057:818) : item=1 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--2E9834F5B0D38DAE42086A7D6552937CD0105DB06C17B3527902A17BCC2DC1E5/cacerts/ inode=4271257 dev=fd:01 mode=dir,700 ouid=dirsrv ogid=dirsrv rdev=00:00 obj=system_u:object_r:dirsrv_tmp_t:s0 objtype=PARENT cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.057:818) : item=0 name=cert0.pem objtype=UNKNOWN cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=CWD msg=audit(Thursday 18 January 2018 �Q1.057:818) : cwd=/var/log/dirsrv/slapd-TESTRELM-TEST
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.057:818) : arch=x86_64 syscall=symlink success=no exit=EACCES(Permission denied) a0=0x55e0f601a612 a1=0x55e0f601a500 a2=0x0 a3=0x7ff07db402d9 items=3 ppid=1 pid=22997 auid=unset uid=dirsrv gid=dirsrv euid=dirsrv suid=dirsrv fsuid=dirsrv egid=dirsrv sgid=dirsrv fsgid=dirsrv tty=(none) ses=unset comm=ns-slapd exe=/usr/sbin/ns-slapd subj=system_u:system_r:dirsrv_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.057:818) : avc: denied { create } for pid=22997 comm=ns-slapd name=517c6459.0 scontext=system_u:system_r:dirsrv_t:s0 tcontext=system_u:object_r:dirsrv_tmp_t:s0 tclass=lnk_file
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.867:825) : proctitle=/usr/sbin/ns-slapd -D /etc/dirsrv/slapd-TESTRELM-TEST -i /var/run/dirsrv/slapd-TESTRELM-TEST.pid
type=PATH msg=audit(Thursday 18 January 2018 �Q1.867:825) : item=2 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--39F79697535A4ABC036DC5A1C0871A13BEF08DD36700B5858BF58A6199CCC9CF/cacerts/517c6459.0 objtype=CREATE cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.867:825) : item=1 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--39F79697535A4ABC036DC5A1C0871A13BEF08DD36700B5858BF58A6199CCC9CF/cacerts/ inode=37754594 dev=fd:01 mode=dir,700 ouid=dirsrv ogid=dirsrv rdev=00:00 obj=system_u:object_r:dirsrv_tmp_t:s0 objtype=PARENT cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.867:825) : item=0 name=cert0.pem objtype=UNKNOWN cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=CWD msg=audit(Thursday 18 January 2018 �Q1.867:825) : cwd=/var/log/dirsrv/slapd-TESTRELM-TEST
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.867:825) : arch=x86_64 syscall=symlink success=no exit=EACCES(Permission denied) a0=0x55afa08b2612 a1=0x55afa08b2500 a2=0x0 a3=0x7f3d1c7192d9 items=3 ppid=1 pid=23376 auid=unset uid=dirsrv gid=dirsrv euid=dirsrv suid=dirsrv fsuid=dirsrv egid=dirsrv sgid=dirsrv fsgid=dirsrv tty=(none) ses=unset comm=ns-slapd exe=/usr/sbin/ns-slapd subj=system_u:system_r:dirsrv_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.867:825) : avc: denied { create } for pid=23376 comm=ns-slapd name=517c6459.0 scontext=system_u:system_r:dirsrv_t:s0 tcontext=system_u:object_r:dirsrv_tmp_t:s0 tclass=lnk_file
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.980:907) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=11) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.025:908) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=12) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.105:910) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=11) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.105:911) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=12) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.133:1075) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=13) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.165:1076) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=14) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.246:1078) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=13) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.246:1079) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=14) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.700:1080) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.700:1080) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=1314 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.700:1080) : avc: denied { block_suspend } for pid=1314 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.701:1081) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.701:1081) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=1314 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.701:1081) : avc: denied { block_suspend } for pid=1314 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.702:1082) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.702:1082) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=1314 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.702:1082) : avc: denied { block_suspend } for pid=1314 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.702:1083) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.702:1083) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=1314 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.702:1083) : avc: denied { block_suspend } for pid=1314 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.780:1102) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.780:1102) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=1831 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.780:1102) : avc: denied { block_suspend } for pid=1831 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.780:1103) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.780:1103) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=1831 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.780:1103) : avc: denied { block_suspend } for pid=1831 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.781:1104) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.781:1104) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=1831 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.781:1104) : avc: denied { block_suspend } for pid=1831 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.781:1105) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.781:1105) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=1831 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.781:1105) : avc: denied { block_suspend } for pid=1831 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.437:1149) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.437:1149) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=2530 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.437:1149) : avc: denied { block_suspend } for pid=2530 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.438:1150) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.438:1150) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=2530 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.438:1150) : avc: denied { block_suspend } for pid=2530 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.438:1151) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.438:1151) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=2530 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.438:1151) : avc: denied { block_suspend } for pid=2530 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.438:1152) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.438:1152) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=2530 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.438:1152) : avc: denied { block_suspend } for pid=2530 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.215:1194) : proctitle=/usr/sbin/ns-slapd -D /etc/dirsrv/slapd-TESTRELM-TEST -i /var/run/dirsrv/slapd-TESTRELM-TEST.pid
type=PATH msg=audit(Thursday 18 January 2018 �Q1.215:1194) : item=2 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--82311CE3969C3653E825C05A13AA8EEBB9693BF13A232503140A1F55F25F8346/cacerts/517c6459.0 objtype=CREATE cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.215:1194) : item=1 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--82311CE3969C3653E825C05A13AA8EEBB9693BF13A232503140A1F55F25F8346/cacerts/ inode=16801057 dev=fd:01 mode=dir,700 ouid=dirsrv ogid=dirsrv rdev=00:00 obj=system_u:object_r:dirsrv_tmp_t:s0 objtype=PARENT cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.215:1194) : item=0 name=cert0.pem objtype=UNKNOWN cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=CWD msg=audit(Thursday 18 January 2018 �Q1.215:1194) : cwd=/var/log/dirsrv/slapd-TESTRELM-TEST
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.215:1194) : arch=x86_64 syscall=symlink success=no exit=EACCES(Permission denied) a0=0x55602d19ae32 a1=0x55602d19ae60 a2=0x0 a3=0x7fb67c1732d9 items=3 ppid=1 pid=8415 auid=unset uid=dirsrv gid=dirsrv euid=dirsrv suid=dirsrv fsuid=dirsrv egid=dirsrv sgid=dirsrv fsgid=dirsrv tty=(none) ses=unset comm=ns-slapd exe=/usr/sbin/ns-slapd subj=system_u:system_r:dirsrv_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.215:1194) : avc: denied { create } for pid=8415 comm=ns-slapd name=517c6459.0 scontext=system_u:system_r:dirsrv_t:s0 tcontext=system_u:object_r:dirsrv_tmp_t:s0 tclass=lnk_file
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.328:1198) : proctitle=/usr/sbin/ns-slapd -D /etc/dirsrv/slapd-TESTRELM-TEST -i /var/run/dirsrv/slapd-TESTRELM-TEST.pid
type=PATH msg=audit(Thursday 18 January 2018 �Q1.328:1198) : item=2 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--09433F490FC013C91C79D565476623A7A36485706F0952CCB1FB7E4F30A329F9/cacerts/517c6459.0 objtype=CREATE cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.328:1198) : item=1 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--09433F490FC013C91C79D565476623A7A36485706F0952CCB1FB7E4F30A329F9/cacerts/ inode=46319815 dev=fd:01 mode=dir,700 ouid=dirsrv ogid=dirsrv rdev=00:00 obj=system_u:object_r:dirsrv_tmp_t:s0 objtype=PARENT cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.328:1198) : item=0 name=cert0.pem objtype=UNKNOWN cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=CWD msg=audit(Thursday 18 January 2018 �Q1.328:1198) : cwd=/var/log/dirsrv/slapd-TESTRELM-TEST
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.328:1198) : arch=x86_64 syscall=symlink success=no exit=EACCES(Permission denied) a0=0x55602d19ba12 a1=0x55602d19af00 a2=0x0 a3=0x7fb67c1732d9 items=3 ppid=1 pid=8415 auid=unset uid=dirsrv gid=dirsrv euid=dirsrv suid=dirsrv fsuid=dirsrv egid=dirsrv sgid=dirsrv fsgid=dirsrv tty=(none) ses=unset comm=ns-slapd exe=/usr/sbin/ns-slapd subj=system_u:system_r:dirsrv_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.328:1198) : avc: denied { create } for pid=8415 comm=ns-slapd name=517c6459.0 scontext=system_u:system_r:dirsrv_t:s0 tcontext=system_u:object_r:dirsrv_tmp_t:s0 tclass=lnk_file
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.259:1226) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=15) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.293:1227) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=16) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.364:1229) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=15) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.364:1230) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=16) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.521:1362) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=17) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.565:1363) : pid=483 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc: received policyload notice (seqno=18) exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.645:1365) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=17) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=USER_AVC msg=audit(Thursday 18 January 2018 �Q1.645:1366) : pid=1 uid=root auid=unset ses=unset subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=18) exe=/usr/lib/systemd/systemd sauid=root hostname=? addr=? terminal=?'
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.086:1367) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.086:1367) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=15993 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.086:1367) : avc: denied { block_suspend } for pid=15993 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.087:1368) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.087:1368) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=15993 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.087:1368) : avc: denied { block_suspend } for pid=15993 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.088:1369) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.088:1369) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=15993 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.088:1369) : avc: denied { block_suspend } for pid=15993 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.088:1370) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.088:1370) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=15993 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.088:1370) : avc: denied { block_suspend } for pid=15993 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.433:1389) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.433:1389) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=16587 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.433:1389) : avc: denied { block_suspend } for pid=16587 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.433:1390) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.433:1390) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=16587 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.433:1390) : avc: denied { block_suspend } for pid=16587 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.433:1391) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.433:1391) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=16587 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.433:1391) : avc: denied { block_suspend } for pid=16587 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.433:1392) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.433:1392) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=16587 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.433:1392) : avc: denied { block_suspend } for pid=16587 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.600:1434) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.600:1434) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=17307 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.600:1434) : avc: denied { block_suspend } for pid=17307 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.600:1435) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.600:1435) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=17307 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.600:1435) : avc: denied { block_suspend } for pid=17307 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.601:1436) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.601:1436) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=17307 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.601:1436) : avc: denied { block_suspend } for pid=17307 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.601:1437) : proctitle=/usr/sbin/httpd -DFOREGROUND
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.601:1437) : arch=x86_64 syscall=epoll_ctl success=yes exit=0 a0=0x7 a1=EPOLL_CTL_DEL a2=0x5 a3=0x0 items=0 ppid=1 pid=17307 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.601:1437) : avc: denied { block_suspend } for pid=17307 comm=httpd capability=block_suspend scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:system_r:httpd_t:s0 tclass=capability2
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.101:1508) : proctitle=/usr/sbin/ns-slapd -D /etc/dirsrv/slapd-TESTRELM-TEST -i /var/run/dirsrv/slapd-TESTRELM-TEST.pid
type=PATH msg=audit(Thursday 18 January 2018 �Q1.101:1508) : item=2 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--C1B67B0EAA7B3CEC2C15D9C768FD95B8D2F8D9B662BD8ADEEA6FDC256FECB410/cacerts/517c6459.0 objtype=CREATE cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.101:1508) : item=1 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--C1B67B0EAA7B3CEC2C15D9C768FD95B8D2F8D9B662BD8ADEEA6FDC256FECB410/cacerts/ inode=71318659 dev=fd:01 mode=dir,700 ouid=dirsrv ogid=dirsrv rdev=00:00 obj=system_u:object_r:dirsrv_tmp_t:s0 objtype=PARENT cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.101:1508) : item=0 name=cert0.pem objtype=UNKNOWN cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=CWD msg=audit(Thursday 18 January 2018 �Q1.101:1508) : cwd=/var/log/dirsrv/slapd-TESTRELM-TEST
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.101:1508) : arch=x86_64 syscall=symlink success=no exit=EACCES(Permission denied) a0=0x55791a56ae32 a1=0x55791a56ae60 a2=0x0 a3=0x7f9ef78fd2d9 items=3 ppid=1 pid=20828 auid=unset uid=dirsrv gid=dirsrv euid=dirsrv suid=dirsrv fsuid=dirsrv egid=dirsrv sgid=dirsrv fsgid=dirsrv tty=(none) ses=unset comm=ns-slapd exe=/usr/sbin/ns-slapd subj=system_u:system_r:dirsrv_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.101:1508) : avc: denied { create } for pid=20828 comm=ns-slapd name=517c6459.0 scontext=system_u:system_r:dirsrv_t:s0 tcontext=system_u:object_r:dirsrv_tmp_t:s0 tclass=lnk_file
----
type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.207:1512) : proctitle=/usr/sbin/ns-slapd -D /etc/dirsrv/slapd-TESTRELM-TEST -i /var/run/dirsrv/slapd-TESTRELM-TEST.pid
type=PATH msg=audit(Thursday 18 January 2018 �Q1.207:1512) : item=2 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--81E91759035DEE54CE0C6B61513ED211232CC7096F77AB997820E245304DE660/cacerts/517c6459.0 objtype=CREATE cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.207:1512) : item=1 name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST--81E91759035DEE54CE0C6B61513ED211232CC7096F77AB997820E245304DE660/cacerts/ inode=13424806 dev=fd:01 mode=dir,700 ouid=dirsrv ogid=dirsrv rdev=00:00 obj=system_u:object_r:dirsrv_tmp_t:s0 objtype=PARENT cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=PATH msg=audit(Thursday 18 January 2018 �Q1.207:1512) : item=0 name=cert0.pem objtype=UNKNOWN cap_fp=none cap_fi=none cap_fe=0 cap_fver=0
type=CWD msg=audit(Thursday 18 January 2018 �Q1.207:1512) : cwd=/var/log/dirsrv/slapd-TESTRELM-TEST
type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.207:1512) : arch=x86_64 syscall=symlink success=no exit=EACCES(Permission denied) a0=0x55791a56bdd2 a1=0x55791a56bb80 a2=0x0 a3=0x7f9ef78fd2d9 items=3 ppid=1 pid=20828 auid=unset uid=dirsrv gid=dirsrv euid=dirsrv suid=dirsrv fsuid=dirsrv egid=dirsrv sgid=dirsrv fsgid=dirsrv tty=(none) ses=unset comm=ns-slapd exe=/usr/sbin/ns-slapd subj=system_u:system_r:dirsrv_t:s0 key=(null)
type=AVC msg=audit(Thursday 18 January 2018 �Q1.207:1512) : avc: denied { create } for pid=20828 comm=ns-slapd name=517c6459.0 scontext=system_u:system_r:dirsrv_t:s0 tcontext=system_u:object_r:dirsrv_tmp_t:s0 tclass=lnk_file
> type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.101:1508) : > proctitle=/usr/sbin/ns-slapd -D /etc/dirsrv/slapd-TESTRELM-TEST -i > /var/run/dirsrv/slapd-TESTRELM-TEST.pid > type=PATH msg=audit(Thursday 18 January 2018 �Q1.101:1508) : item=2 > name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST-- > C1B67B0EAA7B3CEC2C15D9C768FD95B8D2F8D9B662BD8ADEEA6FDC256FECB410/cacerts/ > 517c6459.0 objtype=CREATE cap_fp=none cap_fi=none cap_fe=0 cap_fver=0 > type=PATH msg=audit(Thursday 18 January 2018 �Q1.101:1508) : item=1 > name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST-- > C1B67B0EAA7B3CEC2C15D9C768FD95B8D2F8D9B662BD8ADEEA6FDC256FECB410/cacerts/ > inode=71318659 dev=fd:01 mode=dir,700 ouid=dirsrv ogid=dirsrv rdev=00:00 > obj=system_u:object_r:dirsrv_tmp_t:s0 objtype=PARENT cap_fp=none cap_fi=none > cap_fe=0 cap_fver=0 > type=PATH msg=audit(Thursday 18 January 2018 �Q1.101:1508) : item=0 > name=cert0.pem objtype=UNKNOWN cap_fp=none cap_fi=none cap_fe=0 cap_fver=0 > type=CWD msg=audit(Thursday 18 January 2018 �Q1.101:1508) : > cwd=/var/log/dirsrv/slapd-TESTRELM-TEST > type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.101:1508) : arch=x86_64 > syscall=symlink success=no exit=EACCES(Permission denied) a0=0x55791a56ae32 > a1=0x55791a56ae60 a2=0x0 a3=0x7f9ef78fd2d9 items=3 ppid=1 pid=20828 > auid=unset uid=dirsrv gid=dirsrv euid=dirsrv suid=dirsrv fsuid=dirsrv > egid=dirsrv sgid=dirsrv fsgid=dirsrv tty=(none) ses=unset comm=ns-slapd > exe=/usr/sbin/ns-slapd subj=system_u:system_r:dirsrv_t:s0 key=(null) > type=AVC msg=audit(Thursday 18 January 2018 �Q1.101:1508) : avc: denied { > create } for pid=20828 comm=ns-slapd name=517c6459.0 > scontext=system_u:system_r:dirsrv_t:s0 > tcontext=system_u:object_r:dirsrv_tmp_t:s0 tclass=lnk_file > ---- > type=PROCTITLE msg=audit(Thursday 18 January 2018 �Q1.207:1512) : > proctitle=/usr/sbin/ns-slapd -D /etc/dirsrv/slapd-TESTRELM-TEST -i > /var/run/dirsrv/slapd-TESTRELM-TEST.pid > type=PATH msg=audit(Thursday 18 January 2018 �Q1.207:1512) : item=2 > name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST-- > 81E91759035DEE54CE0C6B61513ED211232CC7096F77AB997820E245304DE660/cacerts/ > 517c6459.0 objtype=CREATE cap_fp=none cap_fi=none cap_fe=0 cap_fver=0 > type=PATH msg=audit(Thursday 18 January 2018 �Q1.207:1512) : item=1 > name=/tmp/openldap-tlsmc-slapd-TESTRELM-TEST-- > 81E91759035DEE54CE0C6B61513ED211232CC7096F77AB997820E245304DE660/cacerts/ > inode=13424806 dev=fd:01 mode=dir,700 ouid=dirsrv ogid=dirsrv rdev=00:00 > obj=system_u:object_r:dirsrv_tmp_t:s0 objtype=PARENT cap_fp=none cap_fi=none > cap_fe=0 cap_fver=0 > type=PATH msg=audit(Thursday 18 January 2018 �Q1.207:1512) : item=0 > name=cert0.pem objtype=UNKNOWN cap_fp=none cap_fi=none cap_fe=0 cap_fver=0 > type=CWD msg=audit(Thursday 18 January 2018 �Q1.207:1512) : > cwd=/var/log/dirsrv/slapd-TESTRELM-TEST > type=SYSCALL msg=audit(Thursday 18 January 2018 �Q1.207:1512) : arch=x86_64 > syscall=symlink success=no exit=EACCES(Permission denied) a0=0x55791a56bdd2 > a1=0x55791a56bb80 a2=0x0 a3=0x7f9ef78fd2d9 items=3 ppid=1 pid=20828 > auid=unset uid=dirsrv gid=dirsrv euid=dirsrv suid=dirsrv fsuid=dirsrv > egid=dirsrv sgid=dirsrv fsgid=dirsrv tty=(none) ses=unset comm=ns-slapd > exe=/usr/sbin/ns-slapd subj=system_u:system_r:dirsrv_t:s0 key=(null) > type=AVC msg=audit(Thursday 18 January 2018 �Q1.207:1512) : avc: denied { > create } for pid=20828 comm=ns-slapd name=517c6459.0 > scontext=system_u:system_r:dirsrv_t:s0 > tcontext=system_u:object_r:dirsrv_tmp_t:s0 tclass=lnk_file That one seems to be already fixed in fedora https://github.com/fedora-selinux/selinux-policy-contrib/commit/779dff2bf4254e0f27e1bd3bc075879512425ac2 *** This bug has been marked as a duplicate of bug 1525488 *** It seems this has not been fixed as pointed out by Lukas in the comment 6. The issue exhibits as part of bug 1541108 comment 10. This is an analogue of bug 1510883. *** This bug has been marked as a duplicate of bug 1525488 *** As described in comment 8, we need to get this fixed in rhel-7.5 as this blocks bug 1541108 which is a blocker already. Hi Mark, I'd like to ask you for a pm_ack+ as we are blocked by this as described above. Thanks. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2018:0763 |