Long XFS filesystem avc errors on boot
Russell Coker
russell at coker.com.au
Thu Apr 15 09:16:25 UTC 2004
On Thu, 15 Apr 2004 18:33, Dennis Gilmore <dennis at ausil.us> wrote:
> Apr 15 11:26:06 asgard kernel: audit(1081992347.449:0): avc: denied
> { getattr } for pid=774 exe=/sbin/pam_console_apply path=/dev/input/js2
> dev=hde2 ino=234962788 scontext=system_u:system_r:pam_console_t
> tcontext=system_u:object_r:unlabeled_t tclass=chr_file
/dev/input/js* should have the type mouse_device_t. Please do a "ls -Z" on
them and tell me what it says. NB It is not going to say unlabeled_t, it
will say whatever is on disk, the kernel uses unlabeled_t if what's on disk
makes no sense with the currently loaded policy.
> Apr 15 11:26:06 asgard kernel: audit(1081992347.464:0): avc: denied
> { dac_override } for pid=774 exe=/sbin/pam_console_apply capability=1
> scontext=system_u:system_r:pam_console_t
> tcontext=system_u:system_r:pam_console_t tclass=capability
What is it trying to do here?
> Apr 15 11:26:06 asgard kernel: audit(1081992347.464:0): avc: denied
> { dac_read_search } for pid=774 exe=/sbin/pam_console_apply capability=2
> scontext=system_u:system_r:pam_console_t
> tcontext=system_u:system_r:pam_console_t tclass=capability
The fact that it tries both in quick succession means that all it really
wanted is read.
> Apr 15 11:26:06 asgard kernel: inode_doinit_with_dentry: getxattr returned
> 13 for dev=hde2 ino=234962799
13 == EACCES? That can't be right. Steve, what do you think about this?
> Apr 15 11:27:19 asgard /sbin/mingetty[1796]: tty1: Operation not permitted
> Apr 15 11:27:19 asgard /sbin/mingetty[1797]: tty2: Operation not permitted
> Apr 15 11:27:19 asgard /sbin/mingetty[1798]: tty3: Operation not permitted
> Apr 15 11:27:19 asgard kernel: audit(1081992439.217:0): avc: denied
> { fowner } for pid=1796 exe=/sbin/mingetty capability=3
> scontext=system_u:system_r:getty_t tcontext=system_u:system_r:getty_t
> tclass=capability
Interesting. Who owns your tty devices?
Granting this capability should not cause a problem so please test allowing
this and see if it does some good. We don't want to grant capabilities
wildly, but this will be OK if there are cases that need it.
> Apr 15 11:27:19 asgard kernel: audit(1081992439.880:0): avc: denied {
> read } for pid=1802 exe=/usr/bin/kdm name=mem dev=hde2 ino=33580795
> scontext=system_u:system_r:xdm_t tcontext=system_u:object_r:memory_device_t
> tclass=chr_file
> Apr 15 11:27:19 asgard kdm[1802]: Cannot read randomFile "/dev/mem"; X
> cookies may be easily guessable
This one is already in bugzilla. You could put an allow rule in custom.te if
you want to reduce the noise. But we deliberately don't want to allow this
in the default policy. kdm needs to be fixed (it was always broken).
> Apr 15 11:27:19 asgard kernel: audit(1081992439.921:0): avc: denied
> { getattr } for pid=1818 exe=/usr/X11R6/bin/Xorg path=/var/log/Xorg.0.log
> dev=hde2 ino=302135865 scontext=system_u:system_r:xdm_t
> tcontext=system_u:object_r:var_log_t tclass=file
Put the following in file_contexts/program/xserver.fc
/var/log/XOrg.* -- system_u:object_r:xserver_log_t
I have attached a suitable xserver.fc file.
Then you have to relabel /var/log after rebuilding the file_contexts file.
Regarding the long message, all the messages after 11:27:19 appeared to be
repeats. The X server and getty will continue restarting forever so will
produce an unlimited amount of messages if they can't startup correctly.
--
http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/ Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/ My home page
-------------- next part --------------
# X server
/dev/agpgart -c system_u:object_r:agp_device_t
/dev/dri(/.*)? system_u:object_r:dri_device_t
/usr/X11R6/bin/Xwrapper -- system_u:object_r:xserver_exec_t
/usr/X11R6/bin/X -- system_u:object_r:xserver_exec_t
/usr/X11R6/bin/XFree86 -- system_u:object_r:xserver_exec_t
/usr/X11R6/bin/Xipaq -- system_u:object_r:xserver_exec_t
/var/lib/xkb(/.*)? system_u:object_r:var_lib_xkb_t
/usr/X11R6/lib(64)?/X11/xkb -d system_u:object_r:var_lib_xkb_t
/usr/X11R6/lib(64)?/X11/xkb/.* -- system_u:object_r:var_lib_xkb_t
/usr/X11R6/lib(64)?/X11/xkb/xkbcomp -- system_u:object_r:bin_t
/var/log/XFree86.* -- system_u:object_r:xserver_log_t
/var/log/XOrg.* -- system_u:object_r:xserver_log_t
/etc/init\.d/xfree86-common -- system_u:object_r:xserver_exec_t
/tmp/\.X11-unix -d system_u:object_r:xdm_xserver_tmp_t
/tmp/\.X11-unix/.* -s <<none>>
/tmp/\.ICE-unix -d system_u:object_r:xdm_xserver_tmp_t
/tmp/\.ICE-unix/.* -s <<none>>
More information about the fedora-selinux-list
mailing list