Description of problem: SELinux is preventing /usr/sbin/httpd from 'search' accesses on the directory /etc/unbound. ***** Plugin catchall (100. confidence) suggests *************************** If aby httpd powinno mieć domyślnie search dostęp do unbound directory. Then proszę to zgłosić jako błąd. Można utworzyć lokalny moduł polityki, aby umożliwić ten dostęp. Do można tymczasowo zezwolić na ten dostęp wykonując polecenia: # grep httpd /var/log/audit/audit.log | audit2allow -M mojapolityka # semodule -i mojapolityka.pp Additional Information: Source Context system_u:system_r:httpd_t:s0 Target Context system_u:object_r:named_conf_t:s0 Target Objects /etc/unbound [ dir ] Source httpd Source Path /usr/sbin/httpd Port <Nieznane> Host (removed) Source RPM Packages httpd-2.4.6-2.fc19.x86_64 Target RPM Packages unbound-libs-1.4.20-9.fc19.x86_64 Policy RPM selinux-policy-3.12.1-71.fc19.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.10.9-200.fc19.x86_64 #1 SMP Wed Aug 21 19:27:58 UTC 2013 x86_64 x86_64 Alert Count 1 First Seen 2013-08-24 19:10:06 CEST Last Seen 2013-08-24 19:10:06 CEST Local ID ea343cc2-4846-4caf-8c38-e24f63216601 Raw Audit Messages type=AVC msg=audit(1377364206.852:430): avc: denied { search } for pid=1767 comm="httpd" name="unbound" dev="sda2" ino=3016838 scontext=system_u:system_r:httpd_t:s0 tcontext=system_u:object_r:named_conf_t:s0 tclass=dir type=SYSCALL msg=audit(1377364206.852:430): arch=x86_64 syscall=stat success=no exit=EACCES a0=7f4c426bbc30 a1=7fff271894d0 a2=7fff271894d0 a3=0 items=0 ppid=1451 pid=1767 auid=4294967295 uid=48 gid=48 euid=48 suid=48 fsuid=48 egid=48 sgid=48 fsgid=48 ses=4294967295 tty=(none) comm=httpd exe=/usr/sbin/httpd subj=system_u:system_r:httpd_t:s0 key=(null) Hash: httpd,httpd_t,named_conf_t,dir,search Additional info: reporter: libreport-2.1.6 hashmarkername: setroubleshoot kernel: 3.10.9-200.fc19.x86_64 type: libreport
Hi Mike, Could you write, what did you do when this happen?
*** This bug has been marked as a duplicate of bug 977695 ***