type=AVC msg=audit(1560913896.432:218): avc: denied { map } for pid=1265 comm="rpm" path="/var/lib/rpm/__db.001" dev="dm-0" ino=2223 scontext=system_u:system_r:rpm_t:s0 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=file permissive=1
Signed-off-by: Dave Sugar <[email protected]>
---
policy/modules/admin/rpm.te | 1 +
1 file changed, 1 insertion(+)
diff --git a/policy/modules/admin/rpm.te b/policy/modules/admin/rpm.te
index e00b8ddd..0e6e9c03 100644
--- a/policy/modules/admin/rpm.te
+++ b/policy/modules/admin/rpm.te
@@ -111,6 +111,7 @@ files_lock_filetrans(rpm_t, rpm_lock_t, file)
manage_dirs_pattern(rpm_t, rpm_var_lib_t, rpm_var_lib_t)
manage_files_pattern(rpm_t, rpm_var_lib_t, rpm_var_lib_t)
+mmap_read_files_pattern(rpm_t, rpm_var_lib_t, rpm_var_lib_t)
files_var_lib_filetrans(rpm_t, rpm_var_lib_t, { dir file })
manage_dirs_pattern(rpm_t, rpm_var_run_t, rpm_var_run_t)
--
2.21.0
On 7/2/19 11:30 AM, Sugar, David wrote:
> type=AVC msg=audit(1560913896.432:218): avc: denied { map } for pid=1265 comm="rpm" path="/var/lib/rpm/__db.001" dev="dm-0" ino=2223 scontext=system_u:system_r:rpm_t:s0 tcontext=system_u:object_r:rpm_var_lib_t:s0 tclass=file permissive=1
>
> Signed-off-by: Dave Sugar <[email protected]>
> ---
> policy/modules/admin/rpm.te | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/policy/modules/admin/rpm.te b/policy/modules/admin/rpm.te
> index e00b8ddd..0e6e9c03 100644
> --- a/policy/modules/admin/rpm.te
> +++ b/policy/modules/admin/rpm.te
> @@ -111,6 +111,7 @@ files_lock_filetrans(rpm_t, rpm_lock_t, file)
>
> manage_dirs_pattern(rpm_t, rpm_var_lib_t, rpm_var_lib_t)
> manage_files_pattern(rpm_t, rpm_var_lib_t, rpm_var_lib_t)
> +mmap_read_files_pattern(rpm_t, rpm_var_lib_t, rpm_var_lib_t)
> files_var_lib_filetrans(rpm_t, rpm_var_lib_t, { dir file })
>
> manage_dirs_pattern(rpm_t, rpm_var_run_t, rpm_var_run_t)
Merged.
--
Chris PeBenito