Bug 597624
| Summary: | selinux-policy-targeted.noarch 0:3.8.1-3.fc14 - avc: denied { read write } at the boot time | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | sd.domrep |
| Component: | selinux-policy-targeted | Assignee: | Daniel Walsh <dwalsh> |
| Status: | CLOSED DUPLICATE | QA Contact: | Ben Levenson <benl> |
| Severity: | medium | Docs Contact: | |
| Priority: | low | ||
| Version: | rawhide | CC: | sd.domrep |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | i686 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2010-06-01 13:41:04 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
*** This bug has been marked as a duplicate of bug 598475 *** |
Description of problem: After update to selinux-policy-targeted.noarch 0:3.8.1-3.fc14 Version-Release number of selected component (if applicable): At the boot time got follow messages: ... SELinux: initialized (dev rootfs, type rootfs), uses genfs_contexts SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts type=1403 audit(1275152052.633:3): policy loaded auid=4294967295 ses=4294967295 dracut: Switching root type=1403 audit(1275152052.633:3): policy loaded auid=4294967295 ses=4294967295 dracut: Switching root type=1400 audit(1275152053.625:4): avc: denied { read write } for pid=293 comm="hostname" path="/dev/console" dev=devtmpfs ino=5566 scontext=system_u:system_r:hostname_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.634:5): avc: denied { read write } for pid=293 comm="hostname" path="/dev/console" dev=devtmpfs ino=5566 scontext=system_u:system_r:hostname_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.715:6): avc: denied { read write } for pid=296 comm="consoletype" path="/dev/null" dev=devtmpfs ino=4053 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.721:7): avc: denied { read write } for pid=297 comm="consoletype" path="/dev/console" dev=devtmpfs ino=5566 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.731:8): avc: denied { read write } for pid=297 comm="consoletype" path="/dev/console" dev=devtmpfs ino=5566 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.744:9): avc: denied { read write } for pid=296 comm="consoletype" path="/dev/null" dev=devtmpfs ino=4053 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.965:10): avc: denied { open } for pid=298 comm="mount" name="null" dev=devtmpfs ino=4053 scontext=system_u:system_r:mount_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.976:11): avc: denied { read write } for pid=300 comm="consoletype" path="/dev/console" dev=devtmpfs ino=5566 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file type=1400 audit(1275152053.983:12): avc: denied { read write } for pid=300 comm="consoletype" path="/dev/console" dev=devtmpfs ino=5566 scontext=system_u:system_r:consoletype_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=chr_file How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info: