/var/lib/pcp/testsuite/917.out.in is in pcp-testsuite 4.0.1-1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 | QA output created by 917
full policy modules list on the system
Checking that pcpupstream policy module has been properly installed
pcpupstream
Checking policies.
--- begin avrule block ---
decl 1:
allow [init_t] [pcp_log_t] : [dir] { read };
allow [init_t] [pcp_log_t] : [file] { getattr };
allow [init_t] [pcp_var_lib_t] : [dir] { add_name read write };
allow [init_t] [pcp_var_lib_t] : [file] { append create execute execute_no_trans getattr ioctl open read write };
allow [init_t] [pcp_var_lib_t] : [lnk_file] { read };
allow [init_t] [tmp_t] : [file] { open };
allow [pcp_pmcd_t] [svirt_sandbox_file_t] : [dir] { open read search };
allow [pcp_pmcd_t] [svirt_lxc_net_t] : [dir] { open read search };
allow [pcp_pmcd_t] [sysctl_net_t] : [dir] { search };
allow [pcp_pmcd_t] [sysctl_net_t] : [file] { getattr open read };
allow [pcp_pmcd_t] [user_home_t] : [file] { execute execute_no_trans open read };
allow [pcp_pmcd_t] [debugfs_t] : [dir] { read };
allow [pcp_pmcd_t] [debugfs_t] : [file] { getattr ioctl open read };
allow [pcp_pmcd_t] [pcp_pmie_exec_t] : [file] { execute execute_no_trans open read };
allow [pcp_pmcd_t] [pcp_var_lib_t] : [fifo_file] { getattr read open unlink };
allow [pcp_pmcd_t] self : [capability] { kill sys_ptrace net_admin chown ipc_owner sys_resource };
allow [pcp_pmcd_t] [initctl_t] : [fifo_file] { getattr };
allow [pcp_pmcd_t] [proc_kcore_t] : [file] { getattr };
allow [pcp_pmcd_t] self : [cap_userns] { sys_ptrace };
allow [pcp_pmcd_t] self : [capability] { kill sys_chroot sys_resource };
allow [pcp_pmcd_t] [nsfs_t] : [file] { open read };
allow [pcp_pmcd_t] [pcp_log_t] : [fifo_file] { getattr read open };
allow [pcp_pmcd_t] [unreserved_port_t] : [tcp_socket] { name_bind name_connect };
allow [pcp_pmcd_t] [websm_port_t] : [tcp_socket] { name_connect };
allow [pcp_pmcd_t] [unconfined_t] : [shm] { unix_read associate getattr };
allow [pcp_pmcd_t] [user_tmp_t] : [fifo_file] { getattr read open };
allow [pcp_pmcd_t] [pcp_tmp_t] : [file] { execute execute_no_trans };
allow [pcp_pmcd_t] [pcp_tmp_t] : [file] { map };
allow [pcp_pmcd_t] [hostname_exec_t] : [file] { execute execute_no_trans getattr open read };
allow [pcp_pmcd_t] [tracefs_t] : [filesystem] { mount };
allow [pcp_pmcd_t] [tracefs_t] : [dir] { open read search };
allow [pcp_pmcd_t] [tracefs_t] : [file] { append open read };
allow [pcp_pmcd_t] [gconf_home_t] : [dir] { search };
allow [pcp_pmcd_t] [virt_etc_t] : [dir] { search };
allow [pcp_pmcd_t] [virt_etc_t] : [file] { open read };
allow [pcp_pmcd_t] [virtd_t] : [unix_stream_socket] { connectto };
allow [pcp_pmcd_t] [haproxy_var_lib_t] : [dir] { search };
allow [pcp_pmcd_t] [haproxy_var_lib_t] : [sock_file] { write };
allow [pcp_pmcd_t] [haproxy_t] : [unix_stream_socket] { connectto };
allow [pcp_pmcd_t] [sysctl_fs_t] : [file] { write };
allow [pcp_pmcd_t] [nfsd_fs_t] : [dir] { search };
allow [pcp_pmcd_t] [nfsd_fs_t] : [file] { getattr open read };
allow [pcp_pmcd_t] [gpmctl_t] : [sock_file] { getattr };
allow [pcp_pmcd_t] [postfix_spool_t] : [dir] { read };
allow [pcp_pmcd_t] [unconfined_service_t] : [sem] { associate getattr };
allow [pcp_pmcd_t] [mock_var_lib_t] : [dir] { getattr };
allow [pcp_pmcd_t] [ldconfig_exec_t] : [file] { map };
allow [pcp_pmcd_t] [httpd_t] : [shm] { unix_read associate getattr };
allow [pcp_pmcd_t] [httpd_t] : [sem] { unix_read associate getattr };
allow [pcp_pmcd_t] [sysfs_t] : [dir] { write };
allow [pcp_pmcd_t] [hugetlbfs_t] : [dir] { open read };
allow [pcp_pmcd_t] [mdadm_exec_t] : [file] { execute execute_no_trans open read };
allow [pcp_pmcd_t] [proc_mdstat_t] : [file] { getattr open read };
allow [pcp_pmcd_t] [numad_t] : [msgq] { unix_read };
allow [pcp_pmcd_t] [glusterd_log_t] : [file] { open read write };
allow [pcp_pmcd_t] [glusterd_t] : [unix_stream_socket] { connectto };
allow [pcp_pmcd_t] [glusterd_var_lib_t] : [dir] { search };
allow [pcp_pmlogger_t] [kmsg_device_t] : [chr_file] { open write };
allow [pcp_pmlogger_t] self : [capability] { kill };
allow [pcp_pmlogger_t] [init_t] : [system] { status };
allow [pcp_pmlogger_t] [devlog_t] : [sock_file] { write };
allow [pcp_pmlogger_t] [devlog_t] : [lnk_file] { read };
allow [pcp_pmlogger_t] self : [capability] { sys_ptrace };
allow [pcp_pmlogger_t] [unconfined_t] : [process] { signal };
allow [pcp_pmlogger_t] [pcp_pmlogger_exec_t] : [file] { execute_no_trans };
allow [pcp_pmlogger_t] [dey_sapi_port_t] : [tcp_socket] { name_connect };
allow [pcp_pmlogger_t] [user_home_dir_t] : [dir] { search };
allow [pcp_pmie_t] [hostname_exec_t] : [file] { execute execute_no_trans getattr open read map };
allow [pcp_pmie_t] self : [capability] { kill sys_ptrace net_admin chown };
allow [pcp_pmie_t] [init_t] : [unix_stream_socket] { connectto };
allow [pcp_pmie_t] [initrc_var_run_t] : [file] { lock open read };
allow [pcp_pmie_t] [init_t] : [system] { status };
allow [pcp_pmie_t] [systemd_unit_file_t] : [file] { getattr };
allow [pcp_pmie_t] [systemd_systemctl_exec_t] : [file] { execute execute_no_trans getattr open read };
allow [pcp_pmie_t] [unconfined_t] : [unix_stream_socket] { connectto };
allow [pcp_pmie_t] [pcp_pmie_exec_t] : [file] { execute_no_trans };
allow [pcp_pmie_t] [proc_net_t] : [file] { read };
allow [pcp_pmie_t] [kmsg_device_t] : [chr_file] { open };
allow [pcp_pmie_t] [pcp_pmcd_t] : [process] { signal };
allow [pcp_pmcd_t] [configfs_t] : [dir] { open read search };
allow [pcp_pmcd_t] [configfs_t] : [file] { getattr open read };
allow [pcp_pmcd_t] [configfs_t] : [lnk_file] { read getattr };
allow [pcp_pmcd_t] [ldconfig_exec_t] : [file] { execute execute_no_trans getattr open read };
allow [pcp_pmcd_t] [modules_conf_t] : [dir] { open read getattr };
allow [pcp_pmcd_t] [modules_conf_t] : [file] { getattr open read };
allow [pcp_pmcd_t] [modules_object_t] : [dir] { search };
allow [pcp_pmcd_t] [modules_object_t] : [file] { getattr open read };
allow [pcp_pmcd_t] [saslauthd_t] : [unix_stream_socket] { connectto };
allow [pcp_pmproxy_t] self : [capability] { net_admin };
allow [pcp_pmproxy_t] [sysctl_net_t] : [file] { getattr open read };
allow [pcp_pmproxy_t] [sysctl_net_t] : [dir] { search };
allow [pcp_pmproxy_t] [proc_net_t] : [file] { read };
allow [pcp_pmmgr_t] [unreserved_port_t] : [tcp_socket] { name_bind };
allow [pcp_pmmgr_t] [unconfined_t] : [unix_stream_socket] { connectto };
allow [pcp_pmmgr_t] [ldconfig_exec_t] : [file] { execute execute_no_trans getattr open read };
allow [pcp_pmmgr_t] [zabbix_port_t] : [tcp_socket] { name_connect };
|