SElinux policy question on F34... lots of "device_t:sock_file write" AVCs

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Since July 6, I've been seeing a lot of AVC's though I've not changed anything in my policies.  Any ideas why?

The majority seem to be device_t:sock_file write which implies to me that it's a macro that's missing in the base policies.


[root@mail mail]# ausearch -m avc | audit2allow


#============= antivirus_t ==============
allow antivirus_t device_t:sock_file write;

#============= apcupsd_t ==============
allow apcupsd_t device_t:sock_file write;

#============= auditd_t ==============
allow auditd_t device_t:sock_file write;

#============= avahi_t ==============
allow avahi_t device_t:sock_file write;

#============= chkpwd_t ==============
allow chkpwd_t self:capability dac_override;

#============= chronyd_t ==============
allow chronyd_t device_t:sock_file write;

#============= cyrus_t ==============
allow cyrus_t device_t:sock_file write;

#============= ftpd_t ==============

#!!!! This avc is allowed in the current policy
allow ftpd_t device_t:sock_file write;

#============= gpm_t ==============
allow gpm_t device_t:sock_file write;

#============= init_t ==============
allow init_t event_device_t:chr_file open;
allow init_t net_conf_t:file create;

#!!!! This avc is allowed in the current policy
allow init_t system_dbusd_var_run_t:sock_file read;

#!!!! This avc is allowed in the current policy
#!!!! This av rule may have been overridden by an extended permission av rule
allow init_t user_home_t:file { ioctl open };
allow init_t xdm_home_t:dir remove_name;

#============= iptables_t ==============
allow iptables_t plymouthd_t:unix_stream_socket connectto;

#============= local_login_t ==============
allow local_login_t device_t:sock_file write;

#============= ntpd_t ==============
allow ntpd_t device_t:sock_file write;

#============= restorecond_t ==============
allow restorecond_t device_t:sock_file write;

#============= saslauthd_t ==============
allow saslauthd_t device_t:sock_file write;

#============= sendmail_t ==============
allow sendmail_t device_t:sock_file write;

#============= setroubleshootd_t ==============
allow setroubleshootd_t dma_device_t:dir getattr;

#============= spamd_t ==============
allow spamd_t device_t:sock_file { getattr write };

#============= sshd_t ==============
allow sshd_t device_t:sock_file write;

#============= syslogd_t ==============
allow syslogd_t device_t:sock_file write;

#============= systemd_logind_t ==============

#!!!! This avc is allowed in the current policy
allow systemd_logind_t session_dbusd_tmp_t:sock_file unlink;

#============= unconfined_t ==============
allow unconfined_t dma_device_t:dir search;
[root@mail mail]# 


And this may or may not be related, but I'm also getting a lot of ssh dropped connections:

ssh_dispatch_run_fatal: Connection to 192.168.4.3 port 22: message authentication code incorrect

_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Users]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]

  Powered by Linux