Quantcast
Channel: CentOS Bug Tracker - Issues
Viewing all articles
Browse latest Browse all 19115

0008805: SELinux is preventing /usr/sbin/ldconfig from 'remove_name' accesses on the directory ld.so.cache~.

$
0
0
Description of problem:<br /> Trying to install the Virtualbox kernel drivers by running the provided '/etc/init.d/vboxdrv setup'<br /> script.<br /> SELinux is preventing /usr/sbin/ldconfig from 'remove_name' accesses on the directory ld.so.cache~.<br /> <br /> ***** Plugin catchall (100. confidence) suggests **************************<br /> <br /> If you believe that ldconfig should be allowed remove_name access on the ld.so.cache~ directory by default.<br /> Then you should report this as a bug.<br /> You can generate a local policy module to allow this access.<br /> Do<br /> allow this access for now by executing:<br /> # grep ldconfig /var/log/audit/audit.log | audit2allow -M mypol<br /> # semodule -i mypol.pp<br /> <br /> Additional Information:<br /> Source Context unconfined_u:system_r:ldconfig_t:s0<br /> Target Context unconfined_u:object_r:initrc_tmp_t:s0<br /> Target Objects ld.so.cache~ [ dir ]<br /> Source ldconfig<br /> Source Path /usr/sbin/ldconfig<br /> Port <Unknown><br /> Host (removed)<br /> Source RPM Packages glibc-2.17-78.el7.x86_64<br /> Target RPM Packages <br /> Policy RPM selinux-policy-3.13.1-23.el7_1.7.noarch<br /> Selinux Enabled True<br /> Policy Type targeted<br /> Enforcing Mode Permissive<br /> Host Name (removed)<br /> Platform Linux (removed) 3.10.0-229.4.2.el7.x86_64 #1 SMP<br /> Wed May 13 10:06:09 UTC 2015 x86_64 x86_64<br /> Alert Count 7<br /> First Seen 2015-05-28 22:13:30 PDT<br /> Last Seen 2015-05-28 22:20:24 PDT<br /> Local ID 0773ba80-5f7a-45b7-a8c6-070adfe528b8<br /> <br /> Raw Audit Messages<br /> type=AVC msg=audit(1432876824.783:417): avc: denied { remove_name } for pid=2265 comm="ldconfig" name="ld.so.cache~" dev="dm-1" ino=645938 scontext=unconfined_u:system_r:ldconfig_t:s0 tcontext=unconfined_u:object_r:initrc_tmp_t:s0 tclass=dir<br /> <br /> <br /> type=AVC msg=audit(1432876824.783:417): avc: denied { rename } for pid=2265 comm="ldconfig" name="ld.so.cache~" dev="dm-1" ino=645938 scontext=unconfined_u:system_r:ldconfig_t:s0 tcontext=unconfined_u:object_r:initrc_tmp_t:s0 tclass=file<br /> <br /> <br /> type=SYSCALL msg=audit(1432876824.783:417): arch=x86_64 syscall=rename success=yes exit=0 a0=231eb70 a1=7fff466c3c90 a2=e5e a3=10 items=0 ppid=28281 pid=2265 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm=ldconfig exe=/usr/sbin/ldconfig subj=unconfined_u:system_r:ldconfig_t:s0 key=(null)<br /> <br /> Hash: ldconfig,ldconfig_t,initrc_tmp_t,dir,remove_name

Viewing all articles
Browse latest Browse all 19115

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>