Bug 1482355 - SELinux is preventing systemd-tmpfile from 'map' accesses on the file /etc/ld.so.cache.
Summary: SELinux is preventing systemd-tmpfile from 'map' accesses on the file /etc/ld...
Keywords:
Status: CLOSED DUPLICATE of bug 1543153
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 28
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Lukas Vrabec
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:a5d8ac1f87ae1c6bed9f8c005a7...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2017-08-17 05:38 UTC by Delete My Account
Modified: 2018-03-23 13:30 UTC (History)
9 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2018-03-23 13:30:31 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Delete My Account 2017-08-17 05:38:20 UTC
Description of problem:
SELinux is preventing systemd-tmpfile from 'map' accesses on the file /etc/ld.so.cache.

*****  Plugin restorecon (94.8 confidence) suggests   ************************

If si desidera sistemare l'etichetta. 
L'etichetta predefinita di /etc/ld.so.cache dovrebbe essere ld_so_cache_t.
Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly.
Do
# /sbin/restorecon -v /etc/ld.so.cache

*****  Plugin catchall_labels (5.21 confidence) suggests   *******************

If you want to allow systemd-tmpfile to have map access on the ld.so.cache file
Then e' necessario modificare l'etichetta su /etc/ld.so.cache
Do
# semanage fcontext -a -t FILE_TYPE '/etc/ld.so.cache'
dove FILE_TYPE è uno dei seguenti: file_context_t, fonts_t, ld_so_cache_t, ld_so_t, lib_t, locale_t, prelink_exec_t, systemd_tmpfiles_exec_t, textrel_shlib_t.
Successivamente, eseguire:
restorecon -v '/etc/ld.so.cache'


*****  Plugin catchall (1.44 confidence) suggests   **************************

If si crede che systemd-tmpfile dovrebbe avere possibilità di accesso map sui ld.so.cache file in modo predefinito.
Then si dovrebbe riportare il problema come bug.
E' possibile generare un modulo di politica locale per consentire questo accesso.
Do
allow this access for now by executing:
# ausearch -c 'systemd-tmpfile' --raw | audit2allow -M my-systemdtmpfile
# semodule -X 300 -i my-systemdtmpfile.pp

Additional Information:
Source Context                system_u:system_r:systemd_tmpfiles_t:s0
Target Context                system_u:object_r:etc_t:s0
Target Objects                /etc/ld.so.cache [ file ]
Source                        systemd-tmpfile
Source Path                   systemd-tmpfile
Port                          <Sconosciuto>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           glibc-2.26-1.fc27.1.x86_64
Policy RPM                    selinux-policy-3.13.1-270.fc27.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 4.13.0-0.rc4.git4.1.fc27.x86_64 #1
                              SMP Fri Aug 11 15:03:46 UTC 2017 x86_64 x86_64
Alert Count                   1
First Seen                    2017-08-14 08:21:16 CEST
Last Seen                     2017-08-14 08:21:16 CEST
Local ID                      1f7c730a-04f5-4eea-bb15-c286fb92ef9f

Raw Audit Messages
type=AVC msg=audit(1502691676.540:1005): avc:  denied  { map } for  pid=2323 comm="systemd-tmpfile" path="/etc/ld.so.cache" dev="sda4" ino=787090 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0


Hash: systemd-tmpfile,systemd_tmpfiles_t,etc_t,file,map

Version-Release number of selected component:
selinux-policy-3.13.1-270.fc27.noarch

Additional info:
component:      selinux-policy
reporter:       libreport-2.9.1
hashmarkername: setroubleshoot
kernel:         4.13.0-0.rc4.git4.1.fc27.x86_64
type:           libreport

Comment 1 Fedora End Of Life 2018-02-20 15:24:32 UTC
This bug appears to have been reported against 'rawhide' during the Fedora 28 development cycle.
Changing version to '28'.

Comment 2 yulinux 2018-03-13 14:57:15 UTC
I have the same problem since today (after an update) on Fedora 27:

glibc-2.26-26.fc27.x86_64 glibc-2.26-26.fc27.i686
selinux-policy-3.13.1-283.26.fc27.noarch

Comment 3 Lukas Vrabec 2018-03-23 13:30:31 UTC

*** This bug has been marked as a duplicate of bug 1543153 ***


Note You need to log in before you can comment on or make changes to this bug.