[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: setroubshoot...neat popup!



Tom London wrote:
Wow... Got neat popup and icon in notification area!  Cool.

Thanks we are still working out the rough edges. I will be blogging on this tool later today or tomorrow.
Message may be a bit misleading, though.  The following yielded a
message about not being able to load a new policy, and that I should
change secure_mode_policyload to 0 (it already is).
Yes this is a bug, it should be looking for the granted versus denied... :^(

Messages generated during yumex update of today's packages.

tom

type=AVC msg=audit(1153835929.352:30): avc:  granted  { load_policy }
for  pid=3362 comm="load_policy"
scontext=system_u:system_r:load_policy_t:s0
tcontext=system_u:object_r:security_t:s0 tclass=security
type=MAC_POLICY_LOAD msg=audit(1153835929.352:30): policy loaded auid=500
type=SYSCALL msg=audit(1153835929.352:30): arch=40000003 syscall=4
success=yes exit=892854 a0=4 a1=b7e16000 a2=d9fb6 a3=bfc9fe48 items=0
ppid=3361 pid=3362 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
sgid=0 fsgid=0 tty=pts0 comm="load_policy" exe="/usr/sbin/load_policy"
subj=system_u:system_r:load_policy_t:s0 key=(null)
type=AVC msg=audit(1153835929.528:31): avc:  denied  { dac_override }
for  pid=1947 comm="python" capability=1
scontext=system_u:system_r:setroubleshoot_t:s0
tcontext=system_u:system_r:setroubleshoot_t:s0 tclass=capability
type=SYSCALL msg=audit(1153835929.528:31): arch=40000003 syscall=33
success=no exit=-13 a0=9aa1848 a1=2 a2=966a64 a3=0 items=1 ppid=1886
pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
sgid=0 fsgid=0 tty=(none) comm="python" exe="/usr/bin/python"
subj=system_u:system_r:setroubleshoot_t:s0 key=(null)
type=CWD msg=audit(1153835929.528:31):  cwd="/"
type=PATH msg=audit(1153835929.528:31): item=0 name="/var/lib/rpm"
inode=2785283 dev=fd:00 mode=040755 ouid=37 ogid=37 rdev=00:00
obj=system_u:object_r:rpm_var_lib_t:s0
type=AVC msg=audit(1153835929.532:32): avc:  denied  { dac_override }
for  pid=1947 comm="python" capability=1
scontext=system_u:system_r:setroubleshoot_t:s0
tcontext=system_u:system_r:setroubleshoot_t:s0 tclass=capability
type=SYSCALL msg=audit(1153835929.532:32): arch=40000003 syscall=33
success=no exit=-13 a0=9ad4a38 a1=2 a2=966a64 a3=0 items=1 ppid=1886
pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
sgid=0 fsgid=0 tty=(none) comm="python" exe="/usr/bin/python"
subj=system_u:system_r:setroubleshoot_t:s0 key=(null)
type=CWD msg=audit(1153835929.532:32):  cwd="/"
type=PATH msg=audit(1153835929.532:32): item=0 name="/var/lib/rpm"
inode=2785283 dev=fd:00 mode=040755 ouid=37 ogid=37 rdev=00:00
obj=system_u:object_r:rpm_var_lib_t:s0
type=AVC msg=audit(1153835929.540:33): avc:  granted  { load_policy }
for  pid=3362 comm="load_policy"
scontext=system_u:system_r:load_policy_t:s0
tcontext=system_u:object_r:security_t:s0 tclass=security
type=SYSCALL msg=audit(1153835929.540:33): arch=40000003 syscall=4
success=yes exit=2 a0=4 a1=bfca0f16 a2=2 a3=0 items=0 ppid=3361
pid=3362 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0
fsgid=0 tty=pts0 comm="load_policy" exe="/usr/sbin/load_policy"
subj=system_u:system_r:load_policy_t:s0 key=(null)
type=AVC msg=audit(1153835931.544:34): avc:  denied  { dac_override }
for  pid=1947 comm="python" capability=1
scontext=system_u:system_r:setroubleshoot_t:s0
tcontext=system_u:system_r:setroubleshoot_t:s0 tclass=capability
type=SYSCALL msg=audit(1153835931.544:34): arch=40000003 syscall=33
success=no exit=-13 a0=9aa5470 a1=2 a2=966a64 a3=0 items=1 ppid=1886
pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
sgid=0 fsgid=0 tty=(none) comm="python" exe="/usr/bin/python"
subj=system_u:system_r:setroubleshoot_t:s0 key=(null)
type=CWD msg=audit(1153835931.544:34):  cwd="/"
type=PATH msg=audit(1153835931.544:34): item=0 name="/var/lib/rpm"
inode=2785283 dev=fd:00 mode=040755 ouid=37 ogid=37 rdev=00:00
obj=system_u:object_r:rpm_var_lib_t:s0
type=AVC msg=audit(1153835931.544:35): avc:  denied  { dac_override }
for  pid=1947 comm="python" capability=1
scontext=system_u:system_r:setroubleshoot_t:s0
tcontext=system_u:system_r:setroubleshoot_t:s0 tclass=capability
type=SYSCALL msg=audit(1153835931.544:35): arch=40000003 syscall=33
success=no exit=-13 a0=9a91000 a1=2 a2=966a64 a3=0 items=1 ppid=1886
pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
sgid=0 fsgid=0 tty=(none) comm="python" exe="/usr/bin/python"
subj=system_u:system_r:setroubleshoot_t:s0 key=(null)
type=CWD msg=audit(1153835931.544:35):  cwd="/"
type=PATH msg=audit(1153835931.544:35): item=0 name="/var/lib/rpm"
inode=2785283 dev=fd:00 mode=040755 ouid=37 ogid=37 rdev=00:00
obj=system_u:object_r:rpm_var_lib_t:s0
type=AVC msg=audit(1153835931.552:36): avc:  denied  { dac_override }
for  pid=1947 comm="python" capability=1
scontext=system_u:system_r:setroubleshoot_t:s0
tcontext=system_u:system_r:setroubleshoot_t:s0 tclass=capability
type=SYSCALL msg=audit(1153835931.552:36): arch=40000003 syscall=33
success=no exit=-13 a0=9aa14d0 a1=2 a2=966a64 a3=0 items=1 ppid=1886
pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
sgid=0 fsgid=0 tty=(none) comm="python" exe="/usr/bin/python"
subj=system_u:system_r:setroubleshoot_t:s0 key=(null)
type=CWD msg=audit(1153835931.552:36):  cwd="/"
type=PATH msg=audit(1153835931.552:36): item=0 name="/var/lib/rpm"
inode=2785283 dev=fd:00 mode=040755 ouid=37 ogid=37 rdev=00:00
obj=system_u:object_r:rpm_var_lib_t:s0
type=AVC msg=audit(1153835931.552:37): avc:  denied  { dac_override }
for  pid=1947 comm="python" capability=1
scontext=system_u:system_r:setroubleshoot_t:s0
tcontext=system_u:system_r:setroubleshoot_t:s0 tclass=capability
type=SYSCALL msg=audit(1153835931.552:37): arch=40000003 syscall=33
success=no exit=-13 a0=9aea538 a1=2 a2=966a64 a3=0 items=1 ppid=1886
pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
sgid=0 fsgid=0 tty=(none) comm="python" exe="/usr/bin/python"
subj=system_u:system_r:setroubleshoot_t:s0 key=(null)
type=CWD msg=audit(1153835931.552:37):  cwd="/"
type=PATH msg=audit(1153835931.552:37): item=0 name="/var/lib/rpm"
inode=2785283 dev=fd:00 mode=040755 ouid=37 ogid=37 rdev=00:00
obj=system_u:object_r:rpm_var_lib_t:s0





[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]