borkage during today's updates....

Tom London selinux at gmail.com
Sun Aug 6 16:22:33 UTC 2006


Running rawhide, targeted/enforcing.

Updates today produced the following during 'yumex'.

tom

libsemanage.semanage_install_active: Could not copy
/etc/selinux/targeted/modules/active/netfilter_contexts to
/etc/selinux/targeted/contexts/netfilter_contexts.
libsemanage.semanage_install_active: Could not copy
/etc/selinux/targeted/modules/active/netfilter_contexts to
/etc/selinux/targeted/contexts/netfilter_contexts.
semodule:  Failed!


type=AVC msg=audit(1154880996.523:64): avc:  denied  { write } for
pid=7536 comm="semodule" name="contexts" dev=dm-0 ino=1081413
scontext=system_u:system_r:semanage_t:s0
tcontext=system_u:object_r:default_context_t:s0 tclass=dir
type=SYSCALL msg=audit(1154880996.523:64): arch=40000003 syscall=5
success=no exit=-13 a0=bf8f19e8 a1=241 a2=1a4 a3=1a4 items=0 ppid=7535
pid=7536 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0
fsgid=0 tty=pts0 comm="semodule" exe="/usr/sbin/semodule"
subj=system_u:system_r:semanage_t:s0 key=(null)
type=AVC msg=audit(1154881005.684:65): avc:  denied  { getattr } for
pid=7591 comm="python" name="__init__.py" dev=dm-0 ino=8587951
scontext=system_u:system_r:setroubleshootd_t:s0
tcontext=system_u:object_r:usr_t:s0 tclass=file
type=SYSCALL msg=audit(1154881005.684:65): arch=40000003 syscall=195
success=no exit=-13 a0=bff360b7 a1=bff35ba4 a2=4abd6ff4 a3=21 items=0
ppid=7590 pid=7591 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
sgid=0 fsgid=0 tty=(none) comm="python" exe="/usr/bin/python"
subj=system_u:system_r:setroubleshootd_t:s0 key=(null)
type=AVC_PATH msg=audit(1154881005.684:65):
path="/usr/share/setroubleshoot/plugins/__init__.py"
type=AVC msg=audit(1154881005.748:66): avc:  denied  { getattr } for
pid=7591 comm="python" name="__init__.pyc" dev=dm-0 ino=8587952
scontext=system_u:system_r:setroubleshootd_t:s0
tcontext=system_u:object_r:usr_t:s0 tclass=file
type=SYSCALL msg=audit(1154881005.748:66): arch=40000003 syscall=195
success=no exit=-13 a0=bff360b7 a1=bff35ba4 a2=4abd6ff4 a3=21 items=0
ppid=1 pid=7591 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
sgid=0 fsgid=0 tty=(none) comm="python" exe="/usr/bin/python"
subj=system_u:system_r:setroubleshootd_t:s0 key=(null)
type=AVC_PATH msg=audit(1154881005.748:66):
path="/usr/share/setroubleshoot/plugins/__init__.pyc"
type=DAEMON_END msg=audit(1154881015.289:1851) auditd normal halt,
sending auid=500 pid=7605 subj=system_u:system_, auditd pid=1898
type=DAEMON_START msg=audit(1154881017.336:6926) auditd start,
ver=1.2.5, format=raw, auid=500 res=success, auditd pid=7620
type=CONFIG_CHANGE msg=audit(1154881017.468:69):
audit_backlog_limit=256 old=256 by auid=500
subj=system_u:system_r:auditctl_t:s0
type=CONFIG_CHANGE msg=audit(1154881017.476:70): audit_enabled=1 old=1
by auid=500 subj=system_u:system_r:auditd_t:s0
type=AVC msg=audit(1154881024.357:71): avc:  denied  { use } for
pid=7649 comm="restorecond" name="null" dev=tmpfs ino=1372
scontext=system_u:system_r:restorecond_t:s0
tcontext=system_u:system_r:rpm_script_t:s0 tclass=fd
type=AVC msg=audit(1154881024.357:71): avc:  denied  { use } for
pid=7649 comm="restorecond" name="null" dev=tmpfs ino=1372
scontext=system_u:system_r:restorecond_t:s0
tcontext=system_u:system_r:rpm_script_t:s0 tclass=fd
type=SYSCALL msg=audit(1154881024.357:71): arch=40000003 syscall=11
success=yes exit=0 a0=83ae870 a1=83ae800 a2=83aea88 a3=83ae608 items=0
ppid=7648 pid=7649 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
sgid=0 fsgid=0 tty=(none) comm="restorecond"
exe="/usr/sbin/restorecond" subj=system_u:system_r:restorecond_t:s0
key=(null)
type=AVC_PATH msg=audit(1154881024.357:71):  path="/dev/null"
type=AVC_PATH msg=audit(1154881024.357:71):  path="/dev/null"


-- 
Tom London




More information about the fedora-selinux-list mailing list