libreport version: 2.0.10 executable: /usr/bin/python2.7 hashmarkername: setroubleshoot kernel: 3.3.7-1.fc16.x86_64 time: czw, 7 cze 2012, 16:58:54 description: :SELinux is preventing /sbin/ldconfig from 'read' accesses on the lnk_file tmp. : :***** Plugin catchall (100. confidence) suggests *************************** : :If aby ldconfig powinno mieć domyślnie read dostęp do tmp lnk_file. :Then proszę to zgłosić jako błąd. :Można utworzyć lokalny moduł polityki, aby umożliwić ten dostęp. :Do :można tymczasowo zezwolić na ten dostęp wykonując polecenia: :# grep ldconfig /var/log/audit/audit.log | audit2allow -M mojapolityka :# semodule -i mojapolityka.pp : :Additional Information: :Source Context unconfined_u:system_r:ldconfig_t:s0-s0:c0.c1023 :Target Context system_u:object_r:tmp_t:s0 :Target Objects tmp [ lnk_file ] :Source ldconfig :Source Path /sbin/ldconfig :Port <Nieznane> :Host (removed) :Source RPM Packages glibc-2.14.90-24.fc16.7.x86_64 : glibc-2.14.90-24.fc16.7.i686 :Target RPM Packages filesystem-2.4.44-1.fc16.x86_64 :Policy RPM selinux-policy-3.10.0-86.fc16.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Enforcing :Host Name (removed) :Platform Linux (removed) 3.3.7-1.fc16.x86_64 #1 SMP : Tue May 22 13:59:39 UTC 2012 x86_64 x86_64 :Alert Count 5 :First Seen czw, 7 cze 2012, 16:44:39 :Last Seen czw, 7 cze 2012, 16:44:39 :Local ID 960feea9-4eaa-4cd6-8cda-39ee95b38089 : :Raw Audit Messages :type=AVC msg=audit(1339080279.811:70): avc: denied { read } for pid=10497 comm="ldconfig" name="tmp" dev="dm-1" ino=786468 scontext=unconfined_u:system_r:ldconfig_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tmp_t:s0 tclass=lnk_file : : :type=SYSCALL msg=audit(1339080279.811:70): arch=x86_64 syscall=open success=no exit=EACCES a0=20d51b0 a1=20241 a2=180 a3=646c2f6374652f68 items=0 ppid=2022 pid=10497 auid=1001 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts1 ses=1 comm=ldconfig exe=/sbin/ldconfig subj=unconfined_u:system_r:ldconfig_t:s0-s0:c0.c1023 key=(null) : :Hash: ldconfig,ldconfig_t,tmp_t,lnk_file,read : :audit2allow : :#============= ldconfig_t ============== :allow ldconfig_t tmp_t:lnk_file read; : :audit2allow -R : :#============= ldconfig_t ============== :allow ldconfig_t tmp_t:lnk_file read; :
# find / -inum 786468 /var/tmp # ls -Zd /var/tmp/ drwxrwxrwt. root root system_u:object_r:tmp_t:s0 /var/tmp/
So this looks like a local customization, although we should probably just allow all apps that search tmp_t to be able to read the lnk_file. Fixed in selinux-policy-3.10.0-129.fc17
I'm using Fedora 16.
Sorry, my wrong, output of "ls -Zd /var/tmp" should be: lrwxrwxrwt. root root system_u:object_r:tmp_t:s0 /var/tmp -> /tmp
Typos... lrwxrwxrwx. root root system_u:object_r:tmp_t:s0 /var/tmp -> /tmp
Miroslav can you back port the fix.
Fixed in selinux-policy-3.10.0-90.fc16
selinux-policy-3.10.0-90.fc16 has been submitted as an update for Fedora 16. https://admin.fedoraproject.org/updates/selinux-policy-3.10.0-90.fc16
Package selinux-policy-3.10.0-90.fc16: * should fix your issue, * was pushed to the Fedora 16 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.10.0-90.fc16' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2012-10203/selinux-policy-3.10.0-90.fc16 then log in and leave karma (feedback).
selinux-policy-3.10.0-90.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.