Summary: SELinux is preventing consoletype (consoletype_t) "write" rpm_script_t. Detailed Description: [consoletype has a permissive type (consoletype_t). This access was not denied.] SELinux denied access requested by consoletype. It is not expected that this access is required by consoletype and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Additional Information: Source Context unconfined_u:system_r:consoletype_t:s0 Target Context unconfined_u:system_r:rpm_script_t:s0-s0:c0.c1023 Target Objects pipe [ fifo_file ] Source consoletype Source Path /sbin/consoletype Port <Unknown> Host (removed) Source RPM Packages initscripts-8.95-1 Target RPM Packages Policy RPM selinux-policy-3.6.12-80.fc11 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.29.6-217.2.8.fc11.x86_64 #1 SMP Sat Aug 15 01:06:26 EDT 2009 x86_64 x86_64 Alert Count 1 First Seen Sun 30 Aug 2009 09:02:21 PM EDT Last Seen Sun 30 Aug 2009 09:02:21 PM EDT Local ID 029a5d82-5059-4e62-91a2-16b880a5050e Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1251680541.922:33621): avc: denied { write } for pid=9214 comm="consoletype" path="pipe:[58488]" dev=pipefs ino=58488 scontext=unconfined_u:system_r:consoletype_t:s0 tcontext=unconfined_u:system_r:rpm_script_t:s0-s0:c0.c1023 tclass=fifo_file node=(removed) type=SYSCALL msg=audit(1251680541.922:33621): arch=c000003e syscall=59 success=yes exit=0 a0=21f8bd0 a1=21f8c30 a2=21f8840 a3=7fff83365400 items=0 ppid=9213 pid=9214 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm="consoletype" exe="/sbin/consoletype" subj=unconfined_u:system_r:consoletype_t:s0 key=(null) Hash String generated from selinux-policy-3.6.12-80.fc11,catchall,consoletype,consoletype_t,rpm_script_t,fifo_file,write audit2allow suggests: #============= consoletype_t ============== allow consoletype_t rpm_script_t:fifo_file write;
*** This bug has been marked as a duplicate of bug 538428 ***