Bug 663623
Summary: | SELinux is preventing mysql_indexes from unix_read, unix_write access on the semaphore Unknown. | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Miroslav Grepl <mgrepl> |
Component: | setroubleshoot-plugins | Assignee: | Daniel Walsh <dwalsh> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | medium | Docs Contact: | |
Priority: | low | ||
Version: | 14 | CC: | dwalsh, jdennis, mgrepl, mrunge |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | setroubleshoot_trace_hash:988f2769f147f8f333af2617030283a86ea4d38f2e2a5a7175aa8b47a26f5ef2 | ||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | 663584 | Environment: | |
Last Closed: | 2012-07-27 13:21:44 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 663584 | ||
Bug Blocks: |
Description
Miroslav Grepl
2010-12-16 12:39:09 UTC
See if you audit.log has roled. # grep mysql_indexes /var/log/audit/audit.log* | audit2allow -M mypol Maybe a better solution would be ausearch -m avc -se mysql_indexes | audit2allow -M mypol [root@mrungexp ~]# ausearch -m avc -se mysql_indexes | audit2allow -M mypol <no matches> compilation failed: mypol.te:6:ERROR 'syntax error' at token '' on line 6: /usr/bin/checkmodule: error(s) encountered while parsing configuration /usr/bin/checkmodule: loading policy configuration from mypol.te Asking myself, if not something else is broken right now. [root@mrungexp ~]# rpm -q audit audit-2.0.4-4.fc14.x86_64 One more try ausearch -m avc -se services_munin_plugin_t | audit2allow -M mypol [root@mrungexp ~]# ausearch -m avc -se services_munin_plugin_t | audit2allow -m mypol module mypol 1.0; require { type unconfined_t; type services_munin_plugin_t; type cupsd_rw_etc_t; type user_tmpfs_t; type tmpfs_t; class sem { write associate read create unix_read unix_write }; class shm { unix_read associate read create write getattr unix_write }; class file { read write open }; } #============= services_munin_plugin_t ============== allow services_munin_plugin_t cupsd_rw_etc_t:file { read open }; #!!!! This avc is allowed in the current policy allow services_munin_plugin_t self:sem { write unix_read unix_write associate read create }; allow services_munin_plugin_t self:shm create; #!!!! This avc is allowed in the current policy allow services_munin_plugin_t self:shm { unix_read write getattr unix_write associate read }; #!!!! This avc is allowed in the current policy allow services_munin_plugin_t tmpfs_t:file { read write }; #!!!! This avc is allowed in the current policy allow services_munin_plugin_t unconfined_t:sem { unix_read read write unix_write associate }; #!!!! This avc is allowed in the current policy allow services_munin_plugin_t unconfined_t:shm { write unix_read getattr unix_write associate read }; #!!!! This avc is allowed in the current policy allow services_munin_plugin_t user_tmpfs_t:file { read write }; After applying the resulting policy, it looks like those errors are gone now. Thank you! Think this can be closed, I'm not sure, if this is a local config error or if it can be reproduced on other systems. Since this version of Fedora is no longer supported I am closing this bugs. If you are still seeing this bug in a current version of fedora, please reopen the bugzilla with the appropriate version number. |