The following was filed automatically by setroubleshoot: Sommario: SELinux is preventing prelink "remove_name" access on slashem.#prelink#.XcovXw. Descrizione dettagliata: [prelink has a permissive type (prelink_t). This access was not denied.] SELinux denied access requested by prelink. It is not expected that this access is required by prelink and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Abilitazione accesso in corso: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Informazioni aggiuntive: Contesto della sorgente system_u:system_r:prelink_t:s0-s0:c0.c1023 Contesto target system_u:object_r:games_exec_t:s0 Oggetti target slashem.#prelink#.XcovXw [ dir ] Sorgente prelink Percorso della sorgente /usr/sbin/prelink Porta <Sconosciuto> Host (removed) Sorgente Pacchetti RPM prelink-0.4.2-2.fc12 Pacchetti RPM target RPM della policy selinux-policy-3.6.30-4.fc12 Selinux abilitato True Tipo di policy targeted MLS abilitato True Modalità Enforcing Enforcing Nome plugin catchall Host Name (removed) Piattaforma Linux (removed) 2.6.31-0.204.rc9.fc12.i686 #1 SMP Sat Sep 5 21:01:10 EDT 2009 i686 i686 Conteggio avvisi 1 Primo visto gio 10 set 2009 04:51:48 CEST Ultimo visto gio 10 set 2009 04:51:48 CEST ID locale 4d1931b3-1b43-4b88-8729-90a32526b8a0 Numeri di linea Messaggi Raw Audit node=(removed) type=AVC msg=audit(1252551108.992:52): avc: denied { remove_name } for pid=4825 comm="prelink" name="slashem.#prelink#.XcovXw" dev=dm-0 ino=32222 scontext=system_u:system_r:prelink_t:s0-s0:c0.c1023 tcontext=system_u:object_r:games_exec_t:s0 tclass=dir node=(removed) type=SYSCALL msg=audit(1252551108.992:52): arch=40000003 syscall=38 success=yes exit=0 a0=bff7fff0 a1=bff80030 a2=8882258 a3=bff80030 items=0 ppid=4816 pid=4825 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=2 comm="prelink" exe="/usr/sbin/prelink" subj=system_u:system_r:prelink_t:s0-s0:c0.c1023 key=(null) audit2allow suggests: #============= prelink_t ============== allow prelink_t games_exec_t:dir remove_name;
Fixed in selinux-policy-3.6.31-1.fc12.noarch