Il giorno ven, 15/12/2017 alle 10.10 -0500, Bill Shirley ha scritto:
> He should at least do a 'ls -lZ' on the file and report to the list.
I have activate this log:
[ root@s-virt ~]# tail -f /var/log/audit/audit.log | grep
--color=auto denied &
[1] 7937
This is the result:
[ root@s-virt ~]# ls -lZ /run/lock/subsys/shorewall
/run/lock/subsys/
-rw-------. root root unconfined_u:object_r:var_lock_t:s0
/run/lock/subsys/shorewall
/run/lock/subsys/:
-rw-r--r--. root root system_u:object_r:var_lock_t:s0 libvirt-guests
-rw-r--r--. root root system_u:object_r:var_lock_t:s0 network
-rw-------. root root unconfined_u:object_r:var_lock_t:s0 shorewall
[ root@s-virt ~]# chcon system_u:object_r:var_lock_t:s0
/run/lock/subsys/shorewall
[ root@s-virt ~]# service shorewall restart
Redirecting to /bin/systemctl restart shorewall.service
type=AVC msg=audit(1513528726.972:629): avc: denied { getattr } for
pid=6475 comm="rm" path="/run/lock/subsys/shorewall" dev="tmpfs" ino=40257
scontext=system_u:system_r:shorewall_t:s0
tcontext=system_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513528726.972:630): avc: denied { unlink } for
pid=6475 comm="rm" name="shorewall" dev="tmpfs" ino=40257
scontext=system_u:system_r:shorewall_t:s0
tcontext=system_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513528727.363:674): avc: denied { write } for
pid=6724 comm="touch" name="shorewall" dev="tmpfs" ino=40257
scontext=system_u:system_r:shorewall_t:s0
tcontext=system_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513528727.363:675): avc: denied { write } for
pid=6724 comm="touch" name="shorewall" dev="tmpfs" ino=40257
scontext=system_u:system_r:shorewall_t:s0
tcontext=system_u:object_r:var_lock_t:s0 tclass=file
[ root@s-virt ~]# ls -lZ /run/lock/subsys/shorewall
-rw-------. root root system_u:object_r:var_lock_t:s0
/run/lock/subsys/shorewall
[ root@s-virt ~]# chcon system_u:system_r:shorewall_t:s0
/run/lock/subsys/shorewall
type=AVC msg=audit(1513528816.785:684): avc: denied { relabelto } for
pid=6791 comm="chcon" name="shorewall" dev="tmpfs" ino=40257
scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
tcontext=system_u:system_r:shorewall_t:s0 tclass=file
chcon: cambio del contesto di "/run/lock/subsys/shorewall" in
"system_u:system_r:shorewall_t:s0" non riuscito: Permesso negato
> Also a 'grep denied /var/log/audit/audit.log'.
This is output of selinux error
[ root@s-virt ~]# grep -E 'denied.*shorewall'
/var/log/audit/audit.log|tail -16
type=AVC msg=audit(1513182259.328:11708): avc: denied { getattr } for
pid=25598 comm="rm" path="/run/lock/subsys/shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513182259.328:11709): avc: denied { unlink } for
pid=25598 comm="rm" name="shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513182259.738:11753): avc: denied { write } for
pid=25858 comm="touch" name="shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513182259.738:11754): avc: denied { write } for
pid=25858 comm="touch" name="shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513183584.000:11776): avc: denied { getattr } for
pid=26688 comm="rm" path="/run/lock/subsys/shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513183584.000:11777): avc: denied { unlink } for
pid=26688 comm="rm" name="shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513183584.415:11821): avc: denied { write } for
pid=26941 comm="touch" name="shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513183584.415:11822): avc: denied { write } for
pid=26941 comm="touch" name="shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513260511.403:13267): avc: denied { getattr } for
pid=29332 comm="rm" path="/run/lock/subsys/shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513260511.403:13268): avc: denied { unlink } for
pid=29332 comm="rm" name="shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513260511.846:13312): avc: denied { write } for
pid=29584 comm="touch" name="shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513260511.846:13313): avc: denied { write } for
pid=29584 comm="touch" name="shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513260551.697:13321): avc: denied { getattr } for
pid=29928 comm="rm" path="/run/lock/subsys/shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513260551.697:13322): avc: denied { unlink } for
pid=29928 comm="rm" name="shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513260552.125:13366): avc: denied { write } for
pid=30181 comm="touch" name="shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
type=AVC msg=audit(1513260552.125:13367): avc: denied { write } for
pid=30181 comm="touch" name="shorewall" dev="tmpfs" ino=192726
scontext=system_u:system_r:shorewall_t:s0
tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file
If I use old "service shorewall restart" or new "systemctl restart
shorewall.service" the error some time (not always) occur
If i restart shorewall via "shorewall -q restart" this error seem do
not occur
Thanks
Dario
> On 12/15/2017 9:56 AM, [email protected] wrote:
> >
> > /run is cleared on every boot so a restorecon wouldn't last. If a reboot
> > doesn't fix it, it's likely a problem in a script of
> > the repo.
> >
> > OP doesn't say how he's pulling these messages, but I can't find them in
> > CentOS7.
> >
> >
> > On 12/15/2017 03:12 AM, Bill Shirley wrote:
> > > Perhaps /run/lock/subsys/shorewall has become mis-labeled? (Fedora 25):
> > > drwxr-xr-x. 45 root root system_u:object_r:var_run_t:s0 1280 Dec 13 09:53
> > > /run
> > > drwxr-xr-x. 6 root root system_u:object_r:var_lock_t:s0 120 Dec 7 01:10
> > > /run/lock
> > > drwxr-xr-x. 2 root root system_u:object_r:var_lock_t:s0 120 Dec 7 17:01
> > > /run/lock/subsys
> > > -rw-------. 1 root root unconfined_u:object_r:var_lock_t:s0 0 Dec 7
> > > 17:00 /run/lock/subsys/shorewall
> > >
> > > Have you tried running restorecon on the file?
> > >
> > > Bill
> > >
> > > On 12/15/2017 5:18 AM, Dario Lesca wrote:
> > > > How to resolve this issue?
> > > >
> > > > dic 14 15:09:12 s-virt.to.loc setroubleshoot[29931]: failed to
> > > > retrieve rpm info for /run/lock/subsys/shorewall
> > > > dic 14 15:09:12 s-virt.to.loc setroubleshoot[29931]: SELinux is
> > > > preventing /usr/bin/rm from getattr access on the file
> > > > /run/lock/subsys/shorewall. For complete SELinux messages run: sealert
> > > > -l 0c3dda49-0ea8-49ab-9dbd-6a7c3d40e4a1
> > > > dic 14 15:09:12 s-virt.to.loc python[29931]: SELinux is preventing
> > > > /usr/bin/rm from getattr access on the file
> > > > /run/lock/subsys/shorewall.
> > > > ...
> > > > dic 14 15:09:12 s-virt.to.loc setroubleshoot[29931]: SELinux is
> > > > preventing /usr/bin/touch from write access on the file
> > > > shorewall. For complete SELinux messages run: sealert -l
> > > > e1a41afa-da77-4c29-ae1e-782146cb825a
> > > > dic 14 15:09:12 s-virt.to.loc python[29931]: SELinux is preventing
> > > > /usr/bin/touch from write access on the file shorewall.
> > > >
> > > > although apparently everything works well
> > > >
> > > > Many thanks
> > > >
> > > > --
> > > > Dario Lesca
> > > > (inviato dal mio Linux Fedora 27 Workstation)
> > > >
> > > > ------------------------------------------------------------------------------
> > > > Check out the vibrant tech community on one of the world's most
> > > > engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> > > > _______________________________________________
> > > > Shorewall-users mailing list
> > > > [email protected]
> > > > https://lists.sourceforge.net/lists/listinfo/shorewall-users
> > >
> > >
> > > ------------------------------------------------------------------------------
> > > Check out the vibrant tech community on one of the world's most
> > > engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> > > _______________________________________________
> > > Shorewall-users mailing list
> > > [email protected]
> > > https://lists.sourceforge.net/lists/listinfo/shorewall-users
> >
> >
> >
> > ------------------------------------------------------------------------------
> > Check out the vibrant tech community on one of the world's most
> > engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> >
> >
> > _______________________________________________
> > Shorewall-users mailing list
> > [email protected]
> > https://lists.sourceforge.net/lists/listinfo/shorewall-users
>
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> _______________________________________________
> Shorewall-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/shorewall-users
--
Dario Lesca
(inviato dal mio Linux Fedora 27 Workstation)
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users