Il giorno ven, 15/12/2017 alle 10.10 -0500, Bill Shirley ha scritto: > He should at least do a 'ls -lZ' on the file and report to the list.
I have activate this log: [ root@s-virt ~]# tail -f /var/log/audit/audit.log | grep --color=auto denied & [1] 7937 This is the result: [ root@s-virt ~]# ls -lZ /run/lock/subsys/shorewall /run/lock/subsys/ -rw-------. root root unconfined_u:object_r:var_lock_t:s0 /run/lock/subsys/shorewall /run/lock/subsys/: -rw-r--r--. root root system_u:object_r:var_lock_t:s0 libvirt-guests -rw-r--r--. root root system_u:object_r:var_lock_t:s0 network -rw-------. root root unconfined_u:object_r:var_lock_t:s0 shorewall [ root@s-virt ~]# chcon system_u:object_r:var_lock_t:s0 /run/lock/subsys/shorewall [ root@s-virt ~]# service shorewall restart Redirecting to /bin/systemctl restart shorewall.service type=AVC msg=audit(1513528726.972:629): avc: denied { getattr } for pid=6475 comm="rm" path="/run/lock/subsys/shorewall" dev="tmpfs" ino=40257 scontext=system_u:system_r:shorewall_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513528726.972:630): avc: denied { unlink } for pid=6475 comm="rm" name="shorewall" dev="tmpfs" ino=40257 scontext=system_u:system_r:shorewall_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513528727.363:674): avc: denied { write } for pid=6724 comm="touch" name="shorewall" dev="tmpfs" ino=40257 scontext=system_u:system_r:shorewall_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513528727.363:675): avc: denied { write } for pid=6724 comm="touch" name="shorewall" dev="tmpfs" ino=40257 scontext=system_u:system_r:shorewall_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=file [ root@s-virt ~]# ls -lZ /run/lock/subsys/shorewall -rw-------. root root system_u:object_r:var_lock_t:s0 /run/lock/subsys/shorewall [ root@s-virt ~]# chcon system_u:system_r:shorewall_t:s0 /run/lock/subsys/shorewall type=AVC msg=audit(1513528816.785:684): avc: denied { relabelto } for pid=6791 comm="chcon" name="shorewall" dev="tmpfs" ino=40257 scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=system_u:system_r:shorewall_t:s0 tclass=file chcon: cambio del contesto di "/run/lock/subsys/shorewall" in "system_u:system_r:shorewall_t:s0" non riuscito: Permesso negato > Also a 'grep denied /var/log/audit/audit.log'. This is output of selinux error [ root@s-virt ~]# grep -E 'denied.*shorewall' /var/log/audit/audit.log|tail -16 type=AVC msg=audit(1513182259.328:11708): avc: denied { getattr } for pid=25598 comm="rm" path="/run/lock/subsys/shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513182259.328:11709): avc: denied { unlink } for pid=25598 comm="rm" name="shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513182259.738:11753): avc: denied { write } for pid=25858 comm="touch" name="shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513182259.738:11754): avc: denied { write } for pid=25858 comm="touch" name="shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513183584.000:11776): avc: denied { getattr } for pid=26688 comm="rm" path="/run/lock/subsys/shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513183584.000:11777): avc: denied { unlink } for pid=26688 comm="rm" name="shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513183584.415:11821): avc: denied { write } for pid=26941 comm="touch" name="shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513183584.415:11822): avc: denied { write } for pid=26941 comm="touch" name="shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513260511.403:13267): avc: denied { getattr } for pid=29332 comm="rm" path="/run/lock/subsys/shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513260511.403:13268): avc: denied { unlink } for pid=29332 comm="rm" name="shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513260511.846:13312): avc: denied { write } for pid=29584 comm="touch" name="shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513260511.846:13313): avc: denied { write } for pid=29584 comm="touch" name="shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513260551.697:13321): avc: denied { getattr } for pid=29928 comm="rm" path="/run/lock/subsys/shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513260551.697:13322): avc: denied { unlink } for pid=29928 comm="rm" name="shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513260552.125:13366): avc: denied { write } for pid=30181 comm="touch" name="shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file type=AVC msg=audit(1513260552.125:13367): avc: denied { write } for pid=30181 comm="touch" name="shorewall" dev="tmpfs" ino=192726 scontext=system_u:system_r:shorewall_t:s0 tcontext=unconfined_u:object_r:var_lock_t:s0 tclass=file If I use old "service shorewall restart" or new "systemctl restart shorewall.service" the error some time (not always) occur If i restart shorewall via "shorewall -q restart" this error seem do not occur Thanks Dario > On 12/15/2017 9:56 AM, cac...@quantum-sci.com wrote: > > > > /run is cleared on every boot so a restorecon wouldn't last. If a reboot > > doesn't fix it, it's likely a problem in a script of > > the repo. > > > > OP doesn't say how he's pulling these messages, but I can't find them in > > CentOS7. > > > > > > On 12/15/2017 03:12 AM, Bill Shirley wrote: > > > Perhaps /run/lock/subsys/shorewall has become mis-labeled? (Fedora 25): > > > drwxr-xr-x. 45 root root system_u:object_r:var_run_t:s0 1280 Dec 13 09:53 > > > /run > > > drwxr-xr-x. 6 root root system_u:object_r:var_lock_t:s0 120 Dec 7 01:10 > > > /run/lock > > > drwxr-xr-x. 2 root root system_u:object_r:var_lock_t:s0 120 Dec 7 17:01 > > > /run/lock/subsys > > > -rw-------. 1 root root unconfined_u:object_r:var_lock_t:s0 0 Dec 7 > > > 17:00 /run/lock/subsys/shorewall > > > > > > Have you tried running restorecon on the file? > > > > > > Bill > > > > > > On 12/15/2017 5:18 AM, Dario Lesca wrote: > > > > How to resolve this issue? > > > > > > > > dic 14 15:09:12 s-virt.to.loc setroubleshoot[29931]: failed to > > > > retrieve rpm info for /run/lock/subsys/shorewall > > > > dic 14 15:09:12 s-virt.to.loc setroubleshoot[29931]: SELinux is > > > > preventing /usr/bin/rm from getattr access on the file > > > > /run/lock/subsys/shorewall. For complete SELinux messages run: sealert > > > > -l 0c3dda49-0ea8-49ab-9dbd-6a7c3d40e4a1 > > > > dic 14 15:09:12 s-virt.to.loc python[29931]: SELinux is preventing > > > > /usr/bin/rm from getattr access on the file > > > > /run/lock/subsys/shorewall. > > > > ... > > > > dic 14 15:09:12 s-virt.to.loc setroubleshoot[29931]: SELinux is > > > > preventing /usr/bin/touch from write access on the file > > > > shorewall. For complete SELinux messages run: sealert -l > > > > e1a41afa-da77-4c29-ae1e-782146cb825a > > > > dic 14 15:09:12 s-virt.to.loc python[29931]: SELinux is preventing > > > > /usr/bin/touch from write access on the file shorewall. > > > > > > > > although apparently everything works well > > > > > > > > Many thanks > > > > > > > > -- > > > > Dario Lesca > > > > (inviato dal mio Linux Fedora 27 Workstation) > > > > > > > > ------------------------------------------------------------------------------ > > > > Check out the vibrant tech community on one of the world's most > > > > engaging tech sites, Slashdot.org! http://sdm.link/slashdot > > > > _______________________________________________ > > > > Shorewall-users mailing list > > > > Shorewall-users@lists.sourceforge.net > > > > https://lists.sourceforge.net/lists/listinfo/shorewall-users > > > > > > > > > ------------------------------------------------------------------------------ > > > Check out the vibrant tech community on one of the world's most > > > engaging tech sites, Slashdot.org! http://sdm.link/slashdot > > > _______________________________________________ > > > Shorewall-users mailing list > > > Shorewall-users@lists.sourceforge.net > > > https://lists.sourceforge.net/lists/listinfo/shorewall-users > > > > > > > > ------------------------------------------------------------------------------ > > Check out the vibrant tech community on one of the world's most > > engaging tech sites, Slashdot.org! http://sdm.link/slashdot > > > > > > _______________________________________________ > > Shorewall-users mailing list > > Shorewall-users@lists.sourceforge.net > > https://lists.sourceforge.net/lists/listinfo/shorewall-users > > > ------------------------------------------------------------------------------ > Check out the vibrant tech community on one of the world's most > engaging tech sites, Slashdot.org! http://sdm.link/slashdot > _______________________________________________ > Shorewall-users mailing list > Shorewall-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/shorewall-users -- Dario Lesca (inviato dal mio Linux Fedora 27 Workstation) ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot _______________________________________________ Shorewall-users mailing list Shorewall-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/shorewall-users