Re: SELinux is preventing systemd-readahe from 'read, open' accesses on the file /usr/sbin/consoletype.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 12/19/2012 07:47 AM, Lawrence Graves wrote:
> SELinux is preventing systemd-readahe from 'read, open' accesses on the
> file /usr/sbin/consoletype.
> 
> ***** Plugin catchall_labels (83.8 confidence) suggests
> ********************
> 
> If you want to allow systemd-readahe to have read open access on the
> consoletype file Then you need to change the label on
> /usr/sbin/consoletype Do # semanage fcontext -a -t FILE_TYPE
> '/usr/sbin/consoletype' where FILE_TYPE is one of the following:
> rpm_script_tmp_t, ld_so_cache_t, readahead_t, machineid_t, abrt_var_run_t,
> etc_runtime_t, sysctl_crypto_t, domain, anon_inodefs_t,
> readahead_var_lib_t, readahead_var_run_t, locale_t, ld_so_t, abrt_t,
> base_ro_file_type, lib_t, man_t, sysctl_type, sysctl_vm_overcommit_t,
> cpu_online_t, mandb_cache_t, cgroup_t, sysfs_t, tmpfs_t, 
> abrt_helper_exec_t, fail2ban_var_lib_t, proc_t, non_security_file_type, 
> textrel_shlib_t, readahead_exec_t, sysctl_kernel_t, prelink_exec_t. Then
> execute: restorecon -v '/usr/sbin/consoletype'
> 
> 
> ***** Plugin catchall (17.1 confidence) suggests
> ***************************
> 
> If you believe that systemd-readahe should be allowed read open access on
> the consoletype file by default. Then you should report this as a bug. You
> can generate a local policy module to allow this access. Do allow this
> access for now by executing: # grep systemd-readahe
> /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp
> 
> Additional Information: Source Context system_u:system_r:readahead_t:s0 
> Target Context system_u:object_r:unlabeled_t:s0 Target Objects
> /usr/sbin/consoletype [ file ] Source systemd-readahe Source Path
> systemd-readahe Port <Unknown> Host JesusChrist Source RPM Packages Target
> RPM Packages initscripts-9.42.1-1.fc18.x86_64 Policy RPM
> selinux-policy-3.11.1-66.fc18.noarch Selinux Enabled True Policy Type
> targeted Enforcing Mode Enforcing Host Name JesusChrist Platform Linux
> JesusChrist 3.6.11-3.fc18.x86_64 #1 SMP Mon Dec 17 21:35:39 UTC 2012 x86_64
> x86_64 Alert Count 2 First Seen 2012-12-19 05:43:39 MST Last Seen
> 2012-12-19 05:44:13 MST Local ID 390ae583-5b9f-49d8-936a-df101e2bab53
> 
> Raw Audit Messages type=AVC msg=audit(1355921053.540:323): avc: denied {
> read open } for pid=288 comm="systemd-readahe" path="/usr/sbin/consoletype"
> dev="sda3" ino=380414 scontext=system_u:system_r:readahead_t:s0 
> tcontext=system_u:object_r:unlabeled_t:s0 tclass=file
> 
> 
> Hash: systemd-readahe,readahead_t,unlabeled_t,file,read,open
> 
> audit2allow
> 
> #============= readahead_t ============== allow readahead_t
> unlabeled_t:file { read open };
> 
> audit2allow -R
> 
> #============= readahead_t ============== allow readahead_t
> unlabeled_t:file { read open };

restorecon -v /usr/sbin/consoletype


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/

iEYEARECAAYFAlDRzswACgkQrlYvE4MpobPv8QCfSl1/UYjcnyeSL5AiiF2WLY1Z
Mn0An25GZ4CCychl/P00yZxs07xv6vye
=CgM/
-----END PGP SIGNATURE-----
-- 
test mailing list
test@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe:
https://admin.fedoraproject.org/mailman/listinfo/test



[Index of Archives]     [Fedora Desktop]     [Fedora SELinux]     [Photo Sharing]     [Yosemite Forum]     [KDE Users]

  Powered by Linux