Hide Forgot
SELinux is preventing /bin/bash from 'execute' accesses on the plik /bin/ls. ***** Plugin catchall (100. confidence) suggests *************************** If aby bash powinno mieć domyślnie execute dostęp do ls file. Then proszę to zgłosić jako błąd. Można utworzyć lokalny moduł polityki, aby umożliwić ten dostęp. Do można tymczasowo zezwolić na ten dostęp wykonując polecenia: # grep sh /var/log/audit/audit.log | audit2allow -M moja_polityka # semodule -i moja_polityka.pp Additional Information: Source Context system_u:system_r:colord_t:s0-s0:c0.c1023 Target Context system_u:object_r:bin_t:s0 Target Objects /bin/ls [ file ] Source sh Source Path /bin/bash Port <Nieznane> Host (removed) Source RPM Packages bash-4.2.10-4.fc15 Target RPM Packages coreutils-8.10-2.fc15 Policy RPM selinux-policy-3.9.16-38.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 2.6.40.4-5.fc15.x86_64 #1 SMP Tue Aug 30 14:38:32 UTC 2011 x86_64 x86_64 Alert Count 63 First Seen nie, 26 cze 2011, 16:07:42 Last Seen wto, 27 wrz 2011, 21:56:32 Local ID 9bd4b2c2-fcdf-4c60-9a28-0b2c2baa16d7 Raw Audit Messages type=AVC msg=audit(1317153392.532:31): avc: denied { execute } for pid=1187 comm="sh" name="ls" dev=dm-1 ino=5599 scontext=system_u:system_r:colord_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file type=SYSCALL msg=audit(1317153392.532:31): arch=x86_64 syscall=access success=yes exit=0 a0=c33820 a1=1 a2=0 a3=1 items=0 ppid=1179 pid=1187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=sh exe=/bin/bash subj=system_u:system_r:colord_t:s0-s0:c0.c1023 key=(null) Hash: sh,colord_t,bin_t,file,execute audit2allow #============= colord_t ============== allow colord_t bin_t:file execute; audit2allow -R #============= colord_t ============== allow colord_t bin_t:file execute;
*** This bug has been marked as a duplicate of bug 741755 ***