Hide Forgot
SELinux is preventing /sbin/consoletype from using the 'dac_override' capabilities. ***** Plugin dac_override (91.4 confidence) suggests *********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests *************************** If you believe that consoletype should have the dac_override capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep consoletype /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:system_r:consoletype_t:s0 Target Context unconfined_u:system_r:consoletype_t:s0 Target Objects Unknown [ capability ] Source consoletype Source Path /sbin/consoletype Port <Unknown> Host (removed) Source RPM Packages initscripts-9.30.1-1.fc15 Target RPM Packages Policy RPM selinux-policy-3.9.16-44.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 2.6.40.6-0.scw20111011.fc15.i686.PAE #1 SMP Tue Oct 11 20:32:12 CEST 2011 i686 i686 Alert Count 2 First Seen Thu 03 Nov 2011 11:08:57 AM CET Last Seen Thu 03 Nov 2011 11:08:57 AM CET Local ID 9bfacfa6-65bc-426e-bc2f-02f0314669b8 Raw Audit Messages type=AVC msg=audit(1320314937.643:206): avc: denied { dac_override } for pid=6362 comm="consoletype" capability=1 scontext=unconfined_u:system_r:consoletype_t:s0 tcontext=unconfined_u:system_r:consoletype_t:s0 tclass=capability type=AVC msg=audit(1320314937.643:206): avc: denied { dac_read_search } for pid=6362 comm="consoletype" capability=2 scontext=unconfined_u:system_r:consoletype_t:s0 tcontext=unconfined_u:system_r:consoletype_t:s0 tclass=capability type=SYSCALL msg=audit(1320314937.643:206): arch=i386 syscall=open success=no exit=EACCES a0=bfb39720 a1=0 a2=0 a3=8 items=0 ppid=6361 pid=6362 auid=2026 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 ses=2 comm=consoletype exe=/sbin/consoletype subj=unconfined_u:system_r:consoletype_t:s0 key=(null) Hash: consoletype,consoletype_t,consoletype_t,capability,dac_override audit2allow #============= consoletype_t ============== allow consoletype_t self:capability { dac_read_search dac_override }; audit2allow -R #============= consoletype_t ============== allow consoletype_t self:capability { dac_read_search dac_override };
When this happened I was installing VMware Player 4.0.0 (VMware-Player-4.0.0-471780.i386.bundle) SELinux alert appeared at the end of the installation.
It is telling you that you should have used kvm. :^) Did everything seem to work correctly? I can not think of any reason that consoletype would need this access unless there was a tty that consoletype did not have read/write access to.
(In reply to comment #2) > It is telling you that you should have used kvm. :^) > > Did everything seem to work correctly? I can not think of any reason that > consoletype would need this access unless there was a tty that consoletype did > not have read/write access to. I was using sudo
sudo what? rpm? and init script?
There's no RPM. VMware Player is distributed as a shell script with binary data attached at the end. I was installing it like this: sudo sh VMware-Player-4.0.0-471780.i386.bundle The installation seems to be OK.
I am going to experiment in Rawhide removing consoletype policy.
Which is good idea, I think.
This message is a notice that Fedora 15 is now at end of life. Fedora has stopped maintaining and issuing updates for Fedora 15. It is Fedora's policy to close all bug reports from releases that are no longer maintained. At this time, all open bugs with a Fedora 'version' of '15' have been closed as WONTFIX. (Please note: Our normal process is to give advanced warning of this occurring, but we forgot to do that. A thousand apologies.) Package Maintainer: If you wish for this bug to remain open because you plan to fix it in a currently maintained version, feel free to reopen this bug and simply change the 'version' to a later Fedora version. Bug Reporter: Thank you for reporting this issue and we are sorry that we were unable to fix it before Fedora 15 reached end of life. If you would still like to see this bug fixed and are able to reproduce it against a later version of Fedora, you are encouraged to click on "Clone This Bug" (top right of this page) and open it against that version of Fedora. Although we aim to fix as many bugs as possible during every release's lifetime, sometimes those efforts are overtaken by events. Often a more recent Fedora release includes newer upstream software that fixes bugs or makes them obsolete. The process we are following is described here: http://fedoraproject.org/wiki/BugZappers/HouseKeeping