Advertisement
Guest User

Untitled

a guest
Sep 9th, 2019
414
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.45 KB | None | 0 0
  1. WITH SELINUX:
  2.  
  3. type=AVC msg=audit(1568043370.328:220): avc: denied { write } for pid=13804 comm="rm" name="net.d" dev="tmpfs" ino=22646 scontext=system_u:system_r:container_t:s0:c0,c912 tcontext=system_u:object_r:var_run_t:s0 tclass=dir permissive=0
  4. type=SYSCALL msg=audit(1568043370.328:220): arch=c000003e syscall=263 success=no exit=-13 a0=ffffffffffffff9c a1=1f270f0 a2=0 a3=7ffe4be83160 items=0 ppid=13785 pid=13804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rm" exe="/usr/bin/rm" subj=system_u:system_r:container_t:s0:c0,c912 key=(null)ARCH=x86_64 SYSCALL=unlinkat AUID="unset" UID="root" GID="root" EUID="root" SUID="root" FSUID="root" EGID="root" SGID="root" FSGID="root"
  5. type=PROCTITLE msg=audit(1568043370.328:220): proctitle=726D002D66002F6574632F636E692F6E65742E642F31302D6B757279722E636F6E66
  6.  
  7. -----------------------------
  8.  
  9. WITH SELINUX PERMISSIVE:
  10.  
  11.  
  12. type=AVC msg=audit(1568043672.461:224): avc: denied { write } for pid=32286 comm="rm" name="net.d" dev="tmpfs" ino=22646 scontext=system_u:system_r:container_t:s0:c0,c912 tcontext=system_u:object_r:var_run_t:s0 tclass=dir permissive=1
  13. type=AVC msg=audit(1568043672.461:224): avc: denied { remove_name } for pid=32286 comm="rm" name="10-kuryr.conf" dev="tmpfs" ino=64108 scontext=system_u:system_r:container_t:s0:c0,c912 tcontext=system_u:object_r:var_run_t:s0 tclass=dir permissive=1
  14. type=AVC msg=audit(1568043672.461:224): avc: denied { unlink } for pid=32286 comm="rm" name="10-kuryr.conf" dev="tmpfs" ino=64108 scontext=system_u:system_r:container_t:s0:c0,c912 tcontext=system_u:object_r:var_run_t:s0 tclass=file permissive=1
  15. type=SYSCALL msg=audit(1568043672.461:224): arch=c000003e syscall=263 success=yes exit=0 a0=ffffffffffffff9c a1=1c420f0 a2=0 a3=7ffc05367a60 items=0 ppid=32206 pid=32286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rm" exe="/usr/bin/rm" subj=system_u:system_r:container_t:s0:c0,c912 key=(null)^]ARCH=x86_64 SYSCALL=unlinkat AUID="unset" UID="root" GID="root" EUID="root" SUID="root" FSUID="root" EGID="root" SGID="root" FSGID="root"
  16. type=PROCTITLE msg=audit(1568043672.461:224): proctitle=726D002D66002F6574632F636E692F6E65742E642F31302D6B757279722E636F6E66
  17. type=AVC msg=audit(1568043672.462:225): avc: denied { write } for pid=32287 comm="rm" name="bin" dev="vda3" ino=41943168 scontext=system_u:system_r:container_t:s0:c0,c912 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir permissive=1
  18. type=AVC msg=audit(1568043672.462:225): avc: denied { remove_name } for pid=32287 comm="rm" name="kuryr-cni" dev="vda3" ino=42000800 scontext=system_u:system_r:container_t:s0:c0,c912 tcontext=system_u:object_r:var_lib_t:s0 tclass=dir permissive=1
  19. type=AVC msg=audit(1568043672.462:225): avc: denied { unlink } for pid=32287 comm="rm" name="kuryr-cni" dev="vda3" ino=42000800 scontext=system_u:system_r:container_t:s0:c0,c912 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=1
  20. type=SYSCALL msg=audit(1568043672.462:225): arch=c000003e syscall=263 success=yes exit=0 a0=ffffffffffffff9c a1=192e0f0 a2=0 a3=7fff1fc28120 items=0 ppid=32206 pid=32287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rm" exe="/usr/bin/rm" subj=system_u:system_r:container_t:s0:c0,c912 key=(null)^]ARCH=x86_64 SYSCALL=unlinkat AUID="unset" UID="root" GID="root" EUID="root" SUID="root" FSUID="root" EGID="root" SGID="root" FSGID="root"()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement