Résumé: SELinux is preventing cat (mysqld_safe_t) "read" mysqld_var_run_t. Description détaillée: [cat a un type permissif (mysqld_safe_t). Cet accès n'a pas été refusé.] SELinux denied access requested by cat. It is not expected that this access is required by cat and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Autoriser l'accès: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Informations complémentaires: Contexte source unconfined_u:system_r:mysqld_safe_t:s0 Contexte cible unconfined_u:object_r:mysqld_var_run_t:s0 Objets du contexte mysqld.pid [ file ] source cat Chemin de la source /bin/cat Port <Inconnu> Hôte (removed) Paquetages RPM source coreutils-7.2-1.fc11 Paquetages RPM cible Politique RPM selinux-policy-3.6.12-39.fc11 Selinux activé True Type de politique targeted Mode strict Enforcing Nom du plugin catchall Nom de l'hôte (removed) Plateforme Linux (removed) 2.6.29.4-167.fc11.x86_64 #1 SMP Wed May 27 17:27:08 EDT 2009 x86_64 x86_64 Compteur d'alertes 2 Première alerte lun. 15 juin 2009 11:54:56 CEST Dernière alerte lun. 15 juin 2009 11:54:56 CEST ID local 4b1e21b5-c91c-46da-a0a2-d49d960097ae Numéros des lignes Messages d'audit bruts node=(removed) type=AVC msg=audit(1245059696.494:23621): avc: denied { read } for pid=6583 comm="cat" name="mysqld.pid" dev=sda5 ino=102062 scontext=unconfined_u:system_r:mysqld_safe_t:s0 tcontext=unconfined_u:object_r:mysqld_var_run_t:s0 tclass=file node=(removed) type=AVC msg=audit(1245059696.494:23621): avc: denied { open } for pid=6583 comm="cat" name="mysqld.pid" dev=sda5 ino=102062 scontext=unconfined_u:system_r:mysqld_safe_t:s0 tcontext=unconfined_u:object_r:mysqld_var_run_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1245059696.494:23621): arch=c000003e syscall=2 success=yes exit=3 a0=7fff886d3f6c a1=0 a2=7fff886d2490 a3=a items=0 ppid=6515 pid=6583 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 ses=1 comm="cat" exe="/bin/cat" subj=unconfined_u:system_r:mysqld_safe_t:s0 key=(null) Hash String generated from selinux-policy-3.6.12-39.fc11,catchall,cat,mysqld_safe_t,mysqld_var_run_t,file,read audit2allow suggests: #============= mysqld_safe_t ============== #!!!! This avc is allowed in the current policy allow mysqld_safe_t mysqld_var_run_t:file { read open };
*** This bug has been marked as a duplicate of bug 538428 ***