Description of problem: Tor throws SELINUX avc -- don't know whether this behavior should be allowed or not. Version-Release number of selected component (if applicable): tor-0.2.0.30-1.fc10.x86_64 How reproducible: Start Tor daemon from initscript Raw Audit Messages : node=system0.mynetwork.lan type=AVC msg=audit(1224789622.962:7): avc: denied { sys_tty_config } for pid=2756 comm="tor" capability=26 scontext=system_u:system_r:tor_t:s0 tcontext=system_u:system_r:tor_t:s0 tclass=capability node=system0.mynetwork.lan type=SYSCALL msg=audit(1224789622.962:7): arch=c000003e syscall=16 success=yes exit=0 a0=1 a1=5401 a2=7fff28282670 a3=7f40202687a0 items=0 ppid=2755 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tor" exe="/usr/bin/tor" subj=system_u:system_r:tor_t:s0 key=(null)
You can allow this for now. # audit2allow -M mypol -l -i /var/log/audit/audit.log # semodule -i mypol.pp Fixed in selinux-policy-3.5.13-7.fc10