SELinux is preventing /sbin/ifconfig from 'search' accesses on the katalog net. ***** Plugin catchall (100. confidence) suggests *************************** If aby ifconfig powinno mieć domyślnie search dostęp do net directory. Then proszę to zgłosić jako błąd. Można utworzyć lokalny moduł polityki, aby umożliwić ten dostęp. Do można tymczasowo zezwolić na ten dostęp wykonując polecenia: # grep ifconfig /var/log/audit/audit.log | audit2allow -M moja_polityka # semodule -i moja_polityka.pp Additional Information: Source Context system_u:system_r:colord_t:s0-s0:c0.c1023 Target Context system_u:object_r:sysctl_net_t:s0 Target Objects net [ dir ] Source ifconfig Source Path /sbin/ifconfig Port <Nieznane> Host (removed) Source RPM Packages net-tools-1.60-117.fc15 Target RPM Packages Policy RPM selinux-policy-3.9.16-38.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 2.6.40.4-5.fc15.x86_64 #1 SMP Tue Aug 30 14:38:32 UTC 2011 x86_64 x86_64 Alert Count 12 First Seen wto, 30 sie 2011, 18:23:48 Last Seen wto, 27 wrz 2011, 21:56:32 Local ID bf4c8436-48ab-4e8e-8910-0b689c734ca8 Raw Audit Messages type=AVC msg=audit(1317153392.619:40): avc: denied { search } for pid=1198 comm="ifconfig" name="net" dev=proc ino=12512 scontext=system_u:system_r:colord_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=dir type=SYSCALL msg=audit(1317153392.619:40): arch=x86_64 syscall=access success=no exit=ENOENT a0=40c3a8 a1=4 a2=2 a3=0 items=0 ppid=1196 pid=1198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=ifconfig exe=/sbin/ifconfig subj=system_u:system_r:colord_t:s0-s0:c0.c1023 key=(null) Hash: ifconfig,colord_t,sysctl_net_t,dir,search audit2allow #============= colord_t ============== allow colord_t sysctl_net_t:dir search; audit2allow -R #============= colord_t ============== allow colord_t sysctl_net_t:dir search;
Fixed in selinux-policy-3.9.16-49.fc15
selinux-policy-3.9.16-50.fc15 has been submitted as an update for Fedora 15. https://admin.fedoraproject.org/updates/selinux-policy-3.9.16-50.fc15
Package selinux-policy-3.9.16-50.fc15: * should fix your issue, * was pushed to the Fedora 15 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.9.16-50.fc15' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2011-17089/selinux-policy-3.9.16-50.fc15 then log in and leave karma (feedback).
selinux-policy-3.9.16-50.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.