| Summary: | SELinux is preventing /sbin/ifconfig from 'open' accesses on the plik dev. | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | doctore |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 15 | CC: | doctore, dominick.grift, dwalsh, mgrepl |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | setroubleshoot_trace_hash:f59a15b23d471670167b504c71e7ada1cb18b8ae91d9bd85d40bb081451b2fdc | ||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-11-21 16:49:22 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
SELinux is preventing /sbin/ifconfig from 'open' accesses on the plik dev. ***** Plugin catchall (100. confidence) suggests *************************** If aby ifconfig powinno mieć domyślnie open dostęp do dev file. Then proszę to zgłosić jako błąd. Można utworzyć lokalny moduł polityki, aby umożliwić ten dostęp. Do można tymczasowo zezwolić na ten dostęp wykonując polecenia: # grep ifconfig /var/log/audit/audit.log | audit2allow -M moja_polityka # semodule -i moja_polityka.pp Additional Information: Source Context system_u:system_r:colord_t:s0-s0:c0.c1023 Target Context system_u:object_r:proc_net_t:s0 Target Objects dev [ file ] Source ifconfig Source Path /sbin/ifconfig Port <Nieznane> Host (removed) Source RPM Packages net-tools-1.60-117.fc15 Target RPM Packages filesystem-2.4.41-1.fc15 Policy RPM selinux-policy-3.9.16-38.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 2.6.40.4-5.fc15.x86_64 #1 SMP Tue Aug 30 14:38:32 UTC 2011 x86_64 x86_64 Alert Count 12 First Seen wto, 30 sie 2011, 18:23:48 Last Seen wto, 27 wrz 2011, 21:56:32 Local ID 05c3b945-dfc2-48b3-86fc-91c0e6ec9f6c Raw Audit Messages type=AVC msg=audit(1317153392.619:41): avc: denied { open } for pid=1198 comm="ifconfig" name="dev" dev=proc ino=4026531973 scontext=system_u:system_r:colord_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_net_t:s0 tclass=file type=SYSCALL msg=audit(1317153392.619:41): arch=x86_64 syscall=open success=yes exit=ENOEXEC a0=40ce2c a1=0 a2=1b6 a3=9 items=0 ppid=1196 pid=1198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=ifconfig exe=/sbin/ifconfig subj=system_u:system_r:colord_t:s0-s0:c0.c1023 key=(null) Hash: ifconfig,colord_t,proc_net_t,file,open audit2allow #============= colord_t ============== allow colord_t proc_net_t:file open; audit2allow -R #============= colord_t ============== allow colord_t proc_net_t:file open;