This file is indexed.

/var/lib/pcp/testsuite/917.out.in is in pcp-testsuite 4.0.1-1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
QA output created by 917
full policy modules list on the system
Checking that pcpupstream policy module has been properly installed
pcpupstream
Checking policies.
--- begin avrule block ---
decl 1:
  allow [init_t] [pcp_log_t] : [dir] { read };
  allow [init_t] [pcp_log_t] : [file] { getattr };
  allow [init_t] [pcp_var_lib_t] : [dir] { add_name read write };
  allow [init_t] [pcp_var_lib_t] : [file] { append create execute execute_no_trans getattr ioctl open read write };
  allow [init_t] [pcp_var_lib_t] : [lnk_file] { read };
  allow [init_t] [tmp_t] : [file] { open };
  allow [pcp_pmcd_t] [svirt_sandbox_file_t] : [dir] { open read search };
  allow [pcp_pmcd_t] [svirt_lxc_net_t] : [dir] { open read search };
  allow [pcp_pmcd_t] [sysctl_net_t] : [dir] { search };
  allow [pcp_pmcd_t] [sysctl_net_t] : [file] { getattr open read };
  allow [pcp_pmcd_t] [user_home_t] : [file] { execute execute_no_trans open read };
  allow [pcp_pmcd_t] [debugfs_t] : [dir] { read };
  allow [pcp_pmcd_t] [debugfs_t] : [file] { getattr ioctl open read };
  allow [pcp_pmcd_t] [pcp_pmie_exec_t] : [file] { execute execute_no_trans open read };
  allow [pcp_pmcd_t] [pcp_var_lib_t] : [fifo_file] { getattr read open unlink };
  allow [pcp_pmcd_t] self : [capability] { kill sys_ptrace net_admin chown ipc_owner sys_resource };
  allow [pcp_pmcd_t] [initctl_t] : [fifo_file] { getattr };
  allow [pcp_pmcd_t] [proc_kcore_t] : [file] { getattr };
  allow [pcp_pmcd_t] self : [cap_userns] { sys_ptrace };
  allow [pcp_pmcd_t] self : [capability] { kill sys_chroot sys_resource };
  allow [pcp_pmcd_t] [nsfs_t] : [file] { open read };
  allow [pcp_pmcd_t] [pcp_log_t] : [fifo_file] { getattr read open };
  allow [pcp_pmcd_t] [unreserved_port_t] : [tcp_socket] { name_bind name_connect };
  allow [pcp_pmcd_t] [websm_port_t] : [tcp_socket] { name_connect };
  allow [pcp_pmcd_t] [unconfined_t] : [shm] { unix_read associate getattr };
  allow [pcp_pmcd_t] [user_tmp_t] : [fifo_file] { getattr read open };
  allow [pcp_pmcd_t] [pcp_tmp_t] : [file] { execute execute_no_trans };
  allow [pcp_pmcd_t] [pcp_tmp_t] : [file] { map };
  allow [pcp_pmcd_t] [hostname_exec_t] : [file] { execute execute_no_trans getattr open read };
  allow [pcp_pmcd_t] [tracefs_t] : [filesystem] { mount };
  allow [pcp_pmcd_t] [tracefs_t] : [dir] { open read search };
  allow [pcp_pmcd_t] [tracefs_t] : [file] { append open read };
  allow [pcp_pmcd_t] [gconf_home_t] : [dir] { search };
  allow [pcp_pmcd_t] [virt_etc_t] : [dir] { search };
  allow [pcp_pmcd_t] [virt_etc_t] : [file] { open read };
  allow [pcp_pmcd_t] [virtd_t] : [unix_stream_socket] { connectto };
  allow [pcp_pmcd_t] [haproxy_var_lib_t] : [dir] { search };
  allow [pcp_pmcd_t] [haproxy_var_lib_t] : [sock_file] { write };
  allow [pcp_pmcd_t] [haproxy_t] : [unix_stream_socket] { connectto };
  allow [pcp_pmcd_t] [sysctl_fs_t] : [file] { write };
  allow [pcp_pmcd_t] [nfsd_fs_t] : [dir] { search };
  allow [pcp_pmcd_t] [nfsd_fs_t] : [file] { getattr open read };
  allow [pcp_pmcd_t] [gpmctl_t] : [sock_file] { getattr };
  allow [pcp_pmcd_t] [postfix_spool_t] : [dir] { read };
  allow [pcp_pmcd_t] [unconfined_service_t] : [sem] { associate getattr };
  allow [pcp_pmcd_t] [mock_var_lib_t] : [dir] { getattr };
  allow [pcp_pmcd_t] [ldconfig_exec_t] : [file] { map };
  allow [pcp_pmcd_t] [httpd_t] : [shm] { unix_read associate getattr };
  allow [pcp_pmcd_t] [httpd_t] : [sem] { unix_read associate getattr };
  allow [pcp_pmcd_t] [sysfs_t] : [dir] { write };
  allow [pcp_pmcd_t] [hugetlbfs_t] : [dir] { open read };
  allow [pcp_pmcd_t] [mdadm_exec_t] : [file] { execute execute_no_trans open read };
  allow [pcp_pmcd_t] [proc_mdstat_t] : [file] { getattr open read };
  allow [pcp_pmcd_t] [numad_t] : [msgq] { unix_read };
  allow [pcp_pmcd_t] [glusterd_log_t] : [file] { open read write };
  allow [pcp_pmcd_t] [glusterd_t] : [unix_stream_socket] { connectto };
  allow [pcp_pmcd_t] [glusterd_var_lib_t] : [dir] { search };
  allow [pcp_pmlogger_t] [kmsg_device_t] : [chr_file] { open write };
  allow [pcp_pmlogger_t] self : [capability] { kill };
  allow [pcp_pmlogger_t] [init_t] : [system] { status };
  allow [pcp_pmlogger_t] [devlog_t] : [sock_file] { write };
  allow [pcp_pmlogger_t] [devlog_t] : [lnk_file] { read };
  allow [pcp_pmlogger_t] self : [capability] { sys_ptrace };
  allow [pcp_pmlogger_t] [unconfined_t] : [process] { signal };
  allow [pcp_pmlogger_t] [pcp_pmlogger_exec_t] : [file] { execute_no_trans };
  allow [pcp_pmlogger_t] [dey_sapi_port_t] : [tcp_socket] { name_connect };
  allow [pcp_pmlogger_t] [user_home_dir_t] : [dir] { search };
  allow [pcp_pmie_t] [hostname_exec_t] : [file] { execute execute_no_trans getattr open read map };
  allow [pcp_pmie_t] self : [capability] { kill sys_ptrace net_admin chown };
  allow [pcp_pmie_t] [init_t] : [unix_stream_socket] { connectto };
  allow [pcp_pmie_t] [initrc_var_run_t] : [file] { lock open read };
  allow [pcp_pmie_t] [init_t] : [system] { status };
  allow [pcp_pmie_t] [systemd_unit_file_t] : [file] { getattr };
  allow [pcp_pmie_t] [systemd_systemctl_exec_t] : [file] { execute execute_no_trans getattr open read };
  allow [pcp_pmie_t] [unconfined_t] : [unix_stream_socket] { connectto };
  allow [pcp_pmie_t] [pcp_pmie_exec_t] : [file] { execute_no_trans };
  allow [pcp_pmie_t] [proc_net_t] : [file] { read };
  allow [pcp_pmie_t] [kmsg_device_t] : [chr_file] { open };
  allow [pcp_pmie_t] [pcp_pmcd_t] : [process] { signal };
  allow [pcp_pmcd_t] [configfs_t] : [dir] { open read search };
  allow [pcp_pmcd_t] [configfs_t] : [file] { getattr open read };
  allow [pcp_pmcd_t] [configfs_t] : [lnk_file] { read getattr };
  allow [pcp_pmcd_t] [ldconfig_exec_t] : [file] { execute execute_no_trans getattr open read };
  allow [pcp_pmcd_t] [modules_conf_t] : [dir] { open read getattr };
  allow [pcp_pmcd_t] [modules_conf_t] : [file] { getattr open read };
  allow [pcp_pmcd_t] [modules_object_t] : [dir] { search };
  allow [pcp_pmcd_t] [modules_object_t] : [file] { getattr open read };
  allow [pcp_pmcd_t] [saslauthd_t] : [unix_stream_socket] { connectto };
  allow [pcp_pmproxy_t] self : [capability] { net_admin };
  allow [pcp_pmproxy_t] [sysctl_net_t] : [file] { getattr open read };
  allow [pcp_pmproxy_t] [sysctl_net_t] : [dir] { search };
  allow [pcp_pmproxy_t] [proc_net_t] : [file] { read };
  allow [pcp_pmmgr_t] [unreserved_port_t] : [tcp_socket] { name_bind };
  allow [pcp_pmmgr_t] [unconfined_t] : [unix_stream_socket] { connectto };
  allow [pcp_pmmgr_t] [ldconfig_exec_t] : [file] { execute execute_no_trans getattr open read };
  allow [pcp_pmmgr_t] [zabbix_port_t] : [tcp_socket] { name_connect };