Added allow rules to git.
37b6084d375830211faf6494a0029b2511d6bc55
I would just allow this and see if it fixes your problem.
On 01/03/2015 10:27 AM, James T. Kirk wrote:
/var/log/audit/audit.log has several of these:
type=AVC msg=audit(1420286239.025:255316): avc: denied { write }
for pid=29005 comm="spamc" path="pipe:[1505813]"
dev="pipefs"
ino=1505813 scontext=system_u:system_r:spamc_t:s0
tcontext=system_u:system_r:sendmail_t:s0 tclass=fifo_file permissive=0
type=SYSCALL msg=audit(1420286239.025:255316): arch=c000003e
syscall=59 success=yes exit=0 a0=7ff563343380 a1=7ff5633463b0
a2=7ff5633462f0 a3=8 items=0 ppid=29004 pid=29005 auid=4294967295
uid=1001 gid=1001 euid=1001 suid=1001 fsuid=1001 egid=1001 sgid=1001
fsgid=1001 tty=(none) ses=4294967295 comm="spamc"
exe="/usr/bin/spamc"
subj=system_u:system_r:spamc_t:s0 key=(null)
type=PROCTITLE msg=audit(1420286239.025:255316):
proctitle="/usr/bin/spamc"
On 1/3/15 4:58 AM, Daniel J Walsh wrote:
> You need to include the AVC messages.
>
>
> On 01/02/2015 11:17 PM, jtkirk wrote:
>> I'm running a Fedora 21 64-bit system, sendmail and spamassassin.
>> Upgraded a little over a week ago from Fedora 20.
>>
>> Don't recall seeing these alerts with Fedora 20.... Only been using
>> SELinux in enforcing mode for a couple months now (apologies in
>> advance if I'm not providing the relevant details - please let me know
>> what else to include). I searched for similar issues but couldn't find
>> anything more recent than 2009.
>>
>> SELinux Alert:
>>
>> The source process: /usr/bin/spamc
>> Attempted this access: write
>> On this fifo_file: fifo_file
>>
>> SETroubleshoot Details Window reports:
>>
>> SELinux is preventing /usr/bin/spamc from write access on the
>> fifo_file fifo_file.
>>
>> ***** Plugin leaks (86.2 confidence) suggests
>> *****************************
>>
>> If you want to ignore spamc trying to write access the fifo_file
>> fifo_file, because you believe it should not need this access.
>> Then you should report this as a bug.
>> You can generate a local policy module to dontaudit this access.
>> Do
>> # grep /usr/bin/spamc /var/log/audit/audit.log | audit2allow -D -M
>> mypol
>> # semodule -i mypol.pp
>>
>> ***** Plugin catchall (14.7 confidence) suggests
>> **************************
>>
>> If you believe that spamc should be allowed write access on the
>> fifo_file fifo_file by default.
>> Then you should report this as a bug.
>> You can generate a local policy module to allow this access.
>> Do
>> allow this access for now by executing:
>> # grep spamc /var/log/audit/audit.log | audit2allow -M mypol
>> # semodule -i mypol.pp
>>
>> Additional Information:
>> Source Context system_u:system_r:spamc_t:s0
>> Target Context system_u:system_r:sendmail_t:s0
>> Target Objects fifo_file [ fifo_file ]
>> Source spamc
>> Source Path /usr/bin/spamc
>> Port <Unknown>
>> Host
mail.streetparknyc.com
>> Source RPM Packages spamassassin-3.4.0-12.fc21.x86_64
>> Target RPM Packages
>> Policy RPM selinux-policy-3.13.1-103.fc21.noarch
>> Selinux Enabled True
>> Policy Type targeted
>> Enforcing Mode Enforcing
>> Host Name
mail.streetparknyc.com
>> Platform Linux
mail.streetparknyc.com
>> 3.17.7-300.fc21.x86_64 #1 SMP Wed Dec 17
>> 03:08:44
>> --
>> selinux mailing list
>> selinux(a)lists.fedoraproject.org
>>
https://admin.fedoraproject.org/mailman/listinfo/selinux
--
selinux mailing list
selinux(a)lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/selinux