SELinux is preventing......

Shane shaned173 at gmail.com
Thu Feb 21 04:12:43 UTC 2013


On 02/20/2013 09:50 PM, Eddie G. O'Connor Jr. wrote:
> I kep receiving messages like this every now and then....I'm just 
> wondering.....should I be concerned? Is there something I need to do 
> to get these alerts and warnings to cease? Any help would be appreciated!

   I searched for the same issue today.  It's a bug: 
https://bugzilla.redhat.com/show_bug.cgi?id=912616 .  A fix was pushed 
yesterday. I'm waiting on the fix.

   Shane

>
> Thanx!
>
>
> EGO II
>
>
> SELinux is preventing /usr/lib/systemd/systemd-hostnamed from open 
> access on the file /sys/devices/virtual/dmi/id/chassis_type.
>
> ***** Plugin catchall (100. confidence) suggests 
> ***************************
>
> If you believe that systemd-hostnamed should be allowed open access on 
> the chassis_type file by default.
> Then you should report this as a bug.
> You can generate a local policy module to allow this access.
> Do
> allow this access for now by executing:
> # grep systemd-hostnam /var/log/audit/audit.log | audit2allow -M mypol
> # semodule -i mypol.pp
>
> Additional Information:
> Source Context system_u:system_r:systemd_hostnamed_t:s0
> Target Context system_u:object_r:sysfs_t:s0
> Target Objects /sys/devices/virtual/dmi/id/chassis_type [ file ]
> Source systemd-hostnam
> Source Path /usr/lib/systemd/systemd-hostnamed
> Port <Unknown>
> Host EDDIE2000
> Source RPM Packages systemd-197-1.fc18.1.i686
> Target RPM Packages
> Policy RPM selinux-policy-3.11.1-78.fc18.noarch
> Selinux Enabled True
> Policy Type targeted
> Enforcing Mode Enforcing
> Host Name EDDIE2000
> Platform Linux 3.7.8-202.fc18.i686 #1 SMP Fri
> Feb 15 17:57:07 UTC 2013 i686 i686
> Alert Count 2
> First Seen 2013-02-20 21:46:01 EST
> Last Seen 2013-02-20 21:46:01 EST
> Local ID 667cee4a-e0d1-4fbd-8ce8-a516e584b6c3
>
> Raw Audit Messages
> type=AVC msg=audit(1361414761.615:346): avc: denied { open } for 
> pid=2333 comm="systemd-hostnam" 
> path="/sys/devices/virtual/dmi/id/chassis_type" dev="sysfs" ino=156 
> scontext=system_u:system_r:systemd_hostnamed_t:s0 
> tcontext=system_u:object_r:sysfs_t:s0 tclass=file
>
>
> type=SYSCALL msg=audit(1361414761.615:346): arch=i386 syscall=open 
> success=no exit=EACCES a0=b77b0da4 a1=88000 a2=1b6 a3=b8ca4788 items=0 
> ppid=1 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 
> egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm=systemd-hostnam 
> exe=/usr/lib/systemd/systemd-hostnamed 
> subj=system_u:system_r:systemd_hostnamed_t:s0 key=(null)
>
> Hash: systemd-hostnam,systemd_hostnamed_t,sysfs_t,file,open
>
> audit2allow
>
> #============= systemd_hostnamed_t ==============
> allow systemd_hostnamed_t sysfs_t:file open;
>
> audit2allow -R
>
> #============= systemd_hostnamed_t ==============
> allow systemd_hostnamed_t sysfs_t:file open;



More information about the users mailing list