PATH:
usr
/
share
/
setroubleshoot
/
plugins
# # Copyright (C) 2008 Red Hat, Inc. # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. # import gettext translation=gettext.translation('setroubleshoot-plugins', fallback=True) _=translation.gettext from setroubleshoot.util import * from setroubleshoot.Plugin import Plugin class plugin(Plugin): summary =_(''' SELinux is preventing $SOURCE_PATH "$ACCESS" access to $TARGET_PATH. ''') problem_description = _(''' SELinux denied svirt access to the block device $TARGET_PATH. If this is a virtualization image, it needs to be labeled with a virtualization file context (virt_image_t). You can relabel $TARGET_PATH to be virt_image_t using chcon. You also need to execute semanage fcontext -a -t virt_image_t '$FIX_TARGET_PATH' to add this new path to the system defaults. If you did not intend to use $TARGET_PATH as a virtualization image it could indicate either a bug or an intrusion attempt. ''') fix_description = _(''' You can alter the file context by executing chcon -t virt_image_t '$TARGET_PATH' You must also change the default file context files on the system in order to preserve them even on a full relabel. "semanage fcontext -a -t virt_image_t '$FIX_TARGET_PATH'" ''') fix_cmd = "/usr/bin/chcon -t virt_image_t '$TARGET_PATH'" then_text = _("You need to change the label on '$FIX_TARGET_PATH'") do_text = _("""# semanage fcontext -a -t virt_image_t '$FIX_TARGET_PATH' # restorecon -v '$FIX_TARGET_PATH'""") def __init__(self): Plugin.__init__(self, __name__) self.set_priority(60) self.fixable=True self.button_text = _("Set the image label to virt_image_t.") def analyze(self, avc): if (avc.matches_source_types(['svirt_t']) and avc.all_accesses_are_in(avc.rw_file_perms + avc.r_dir_perms) and avc.has_tclass_in(['blk_file'])): # MATCH return self.report() else: return None
[-] catchall_boolean.py
[edit]
[-] allow_execheap.py
[edit]
[+]
__pycache__
[-] mounton.py
[edit]
[-] selinuxpolicy.py
[edit]
[-] device.py
[edit]
[-] public_content.py
[edit]
[-] kernel_modules.py
[edit]
[-] restorecon_source.py
[edit]
[-] automount_exec_config.py
[edit]
[-] restorecon.py
[edit]
[-] mmap_zero.py
[edit]
[-] mozplugger_remove.py
[edit]
[-] sshd_root.py
[edit]
[-] sys_resource.py
[edit]
[-] leaks.py
[edit]
[-] allow_ftpd_use_nfs.py
[edit]
[-] chrome.py
[edit]
[-] allow_anon_write.py
[edit]
[-] filesystem_associate.py
[edit]
[-] allow_execmod.py
[edit]
[-] allow_execmem.py
[edit]
[-] xen_image.py
[edit]
[-] allow_ftpd_use_cifs.py
[edit]
[-] allow_execstack.py
[edit]
[-] connect_ports.py
[edit]
[-] catchall_labels.py
[edit]
[-] qemu_blk_image.py
[edit]
[-] dac_override.py
[edit]
[-] disable_ipv6.py
[edit]
[-] mozplugger.py
[edit]
[-] httpd_write_content.py
[edit]
[-] associate.py
[edit]
[-] httpd_can_sendmail.py
[edit]
[-] wine.py
[edit]
[-] sandbox_connect.py
[edit]
[-] swapfile.py
[edit]
[-] catchall.py
[edit]
[-] openvpn.py
[edit]
[-] samba_share.py
[edit]
[-] vbetool.py
[edit]
[-] rsync_data.py
[edit]
[-] sys_module.py
[edit]
[+]
..
[-] cvs_data.py
[edit]
[-] setenforce.py
[edit]
[-] httpd_unified.py
[edit]
[-] bind_ports.py
[edit]
[-] qemu_file_image.py
[edit]
[-] __init__.py
[edit]
[-] file.py
[edit]