Hi all!
It's my first post.
I last try to connect Palm to computer with F10 using synce-hal. I got several selinux alerts.
All files has default context, pppd works fine with command line.
SELinux is preventing pppd (hald_t) "read" ./options (pppd_etc_rw_t).
Additional Information:
Source Context system_u:system_r:hald_t Target Context system_u:object_r:pppd_etc_rw_t Target Objects ./options [ file ] Source pppd Source Path /usr/sbin/pppd Port <Unknown> Host localhost.localdomain Source RPM Packages ppp-2.4.4-8.fc10 Target RPM Packages Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall_file Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 2 First Seen Fri Mar 20 19:13:17 2009 Last Seen Fri Mar 20 20:17:07 2009 Local ID 746a1a3e-6177-42e3-9a45-44beb2856c56 Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.818:385): avc: denied { read } for pid=11770 comm="pppd" name="options" dev=dm-0 ino=360195 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.818:385): arch=40000003 syscall=5 success=yes exit=4 a0=a10303 a1=0 a2=1b6 a3=0 items=0 ppid=11756 pid=11770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="pppd" exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0 key=(null)
SELinux is preventing pppd (hald_t) "getattr" /etc/ppp/options (pppd_etc_rw_t).
Additional Information:
Source Context system_u:system_r:hald_t Target Context system_u:object_r:pppd_etc_rw_t Target Objects /etc/ppp/options [ file ] Source pppd Source Path /usr/sbin/pppd Port <Unknown> Host localhost.localdomain Source RPM Packages ppp-2.4.4-8.fc10 Target RPM Packages ppp-2.4.4-8.fc10 Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall_file Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 2 First Seen Fri Mar 20 19:13:17 2009 Last Seen Fri Mar 20 20:17:07 2009 Local ID c291b3a2-1c71-4baf-a2c5-f854f049f31a Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.818:386): avc: denied { getattr } for pid=11770 comm="pppd" path="/etc/ppp/options" dev=dm-0 ino=360195 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.818:386): arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfa6ee14 a2=40eff4 a3=e0e080 items=0 ppid=11756 pid=11770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="pppd" exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0 key=(null)
SELinux is preventing pppd (hald_t) "read write" ./pppd2.tdb (pppd_var_run_t).
Additional Information:
Source Context system_u:system_r:hald_t Target Context system_u:object_r:pppd_var_run_t Target Objects ./pppd2.tdb [ file ] Source pppd Source Path /usr/sbin/pppd Port <Unknown> Host localhost.localdomain Source RPM Packages ppp-2.4.4-8.fc10 Target RPM Packages Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall_file Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 2 First Seen Fri Mar 20 19:13:17 2009 Last Seen Fri Mar 20 20:17:07 2009 Local ID 1bef60ad-3bca-46eb-bb03-64983c6e80e0 Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.878:387): avc: denied { read write } for pid=11770 comm="pppd" name="pppd2.tdb" dev=dm-0 ino=5272278 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:pppd_var_run_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.878:387): arch=40000003 syscall=5 success=yes exit=7 a0=a10333 a1=42 a2=1a4 a3=0 items=0 ppid=11756 pid=11770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="pppd" exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0 key=(null)
SELinux is preventing pppd (hald_t) "getattr" /var/run/pppd2.tdb (pppd_var_run_t).
Additional Information:
Source Context system_u:system_r:hald_t Target Context system_u:object_r:pppd_var_run_t Target Objects /var/run/pppd2.tdb [ file ] Source pppd Source Path /usr/sbin/pppd Port <Unknown> Host localhost.localdomain Source RPM Packages ppp-2.4.4-8.fc10 Target RPM Packages Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall_file Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 2 First Seen Fri Mar 20 19:13:17 2009 Last Seen Fri Mar 20 20:17:07 2009 Local ID 07544813-1176-427b-ab4a-dded6daaf56e Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.878:388): avc: denied { getattr } for pid=11770 comm="pppd" path="/var/run/pppd2.tdb" dev=dm-0 ino=5272278 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:pppd_var_run_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.878:388): arch=40000003 syscall=197 success=yes exit=0 a0=7 a1=bfa6f674 a2=40eff4 a3=e10f98 items=0 ppid=11756 pid=11770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="pppd" exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0 key=(null)
SELinux is preventing pppd (hald_t) "create" ./LCK..ttyUSB0 (var_lock_t).
Additional Information:
Source Context system_u:system_r:hald_t Target Context system_u:object_r:var_lock_t Target Objects ./LCK..ttyUSB0 [ file ] Source pppd Source Path /usr/sbin/pppd Port <Unknown> Host localhost.localdomain Source RPM Packages ppp-2.4.4-8.fc10 Target RPM Packages Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall_file Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 2 First Seen Fri Mar 20 19:13:17 2009 Last Seen Fri Mar 20 20:17:07 2009 Local ID e59e15b8-a651-430a-9581-79bd1e36e4f7 Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.879:389): avc: denied { create } for pid=11771 comm="pppd" name="LCK..ttyUSB0" scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=file
node=localhost.localdomain type=AVC msg=audit(1237576627.879:389): avc: denied { read write } for pid=11771 comm="pppd" name="LCK..ttyUSB0" dev=dm-0 ino=5265361 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.879:389): arch=40000003 syscall=5 success=yes exit=8 a0=a27520 a1=c2 a2=1a4 a3=bfa6e6ec items=0 ppid=1 pid=11771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="pppd" exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0 key=(null)
SELinux is preventing hal-dccm (hald_dccm_t) "getattr" hald_dccm_t.
Additional Information:
Source Context system_u:system_r:hald_dccm_t Target Context system_u:system_r:hald_dccm_t Target Objects pipe [ fifo_file ] Source hal-dccm Source Path /usr/libexec/hal-dccm Port <Unknown> Host localhost.localdomain Source RPM Packages synce-hal-0.1-1.fc10 Target RPM Packages Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 2 First Seen Fri Mar 20 19:13:17 2009 Last Seen Fri Mar 20 20:17:07 2009 Local ID 03e073b1-7c9a-41d6-9eea-c736309b5f8f Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.903:390): avc: denied { getattr } for pid=11756 comm="hal-dccm" path="pipe:[209228]" dev=pipefs ino=209228 scontext=system_u:system_r:hald_dccm_t:s0 tcontext=system_u:system_r:hald_dccm_t:s0 tclass=fifo_file
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.903:390): arch=40000003 syscall=197 success=yes exit=0 a0=5 a1=bfcb2aac a2=6aeff4 a3=5 items=0 ppid=2129 pid=11756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="hal-dccm" exe="/usr/libexec/hal-dccm" subj=system_u:system_r:hald_dccm_t:s0 key=(null)
SELinux is preventing hal-dccm (hald_dccm_t) "create" hald_dccm_t.
Additional Information:
Source Context system_u:system_r:hald_dccm_t Target Context system_u:system_r:hald_dccm_t Target Objects None [ unix_dgram_socket ] Source hal-dccm Source Path /usr/libexec/hal-dccm Port <Unknown> Host localhost.localdomain Source RPM Packages synce-hal-0.1-1.fc10 Target RPM Packages Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 2 First Seen Fri Mar 20 19:13:17 2009 Last Seen Fri Mar 20 20:17:07 2009 Local ID c1f75682-ab61-46ea-85f2-3e081eedfc01 Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.903:391): avc: denied { create } for pid=11756 comm="hal-dccm" scontext=system_u:system_r:hald_dccm_t:s0 tcontext=system_u:system_r:hald_dccm_t:s0 tclass=unix_dgram_socket
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.903:391): arch=40000003 syscall=102 success=yes exit=0 a0=1 a1=bfcb2540 a2=6aeff4 a3=6b23cc items=0 ppid=2129 pid=11756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="hal-dccm" exe="/usr/libexec/hal-dccm" subj=system_u:system_r:hald_dccm_t:s0 key=(null)
SELinux is preventing hal-dccm (hald_dccm_t) "connect" hald_dccm_t.
Additional Information:
Source Context system_u:system_r:hald_dccm_t Target Context system_u:system_r:hald_dccm_t Target Objects None [ unix_dgram_socket ] Source hal-dccm Source Path /usr/libexec/hal-dccm Port <Unknown> Host localhost.localdomain Source RPM Packages synce-hal-0.1-1.fc10 Target RPM Packages Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 2 First Seen Fri Mar 20 19:13:17 2009 Last Seen Fri Mar 20 20:17:07 2009 Local ID b2c25766-1a6d-4453-a81b-9a895be0a06b Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.903:392): avc: denied { connect } for pid=11756 comm="hal-dccm" scontext=system_u:system_r:hald_dccm_t:s0 tcontext=system_u:system_r:hald_dccm_t:s0 tclass=unix_dgram_socket
node=localhost.localdomain type=AVC msg=audit(1237576627.903:392): avc: denied { write } for pid=11756 comm="hal-dccm" name="log" dev=tmpfs ino=7412 scontext=system_u:system_r:hald_dccm_t:s0 tcontext=system_u:object_r:devlog_t:s0 tclass=sock_file
node=localhost.localdomain type=AVC msg=audit(1237576627.903:392): avc: denied { sendto } for pid=11756 comm="hal-dccm" path="/dev/log" scontext=system_u:system_r:hald_dccm_t:s0 tcontext=system_u:system_r:syslogd_t:s0 tclass=unix_dgram_socket
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.903:392): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcb2540 a2=6aeff4 a3=0 items=0 ppid=2129 pid=11756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="hal-dccm" exe="/usr/libexec/hal-dccm" subj=system_u:system_r:hald_dccm_t:s0 key=(null)
SELinux is preventing hal-dccm (hald_dccm_t) "search" ./dbus (system_dbusd_var_run_t).
Additional Information:
Source Context system_u:system_r:hald_dccm_t Target Context system_u:object_r:system_dbusd_var_run_t Target Objects ./dbus [ dir ] Source hal-dccm Source Path /usr/libexec/hal-dccm Port <Unknown> Host localhost.localdomain Source RPM Packages synce-hal-0.1-1.fc10 Target RPM Packages Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall_file Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 2 First Seen Fri Mar 20 19:13:17 2009 Last Seen Fri Mar 20 20:17:07 2009 Local ID 418b2252-1561-4209-ba8d-8ed9f4917c7b Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.907:393): avc: denied { search } for pid=11756 comm="hal-dccm" name="dbus" dev=dm-0 ino=5265901 scontext=system_u:system_r:hald_dccm_t:s0 tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=dir
node=localhost.localdomain type=AVC msg=audit(1237576627.907:393): avc: denied { write } for pid=11756 comm="hal-dccm" name="system_bus_socket" dev=dm-0 ino=5265775 scontext=system_u:system_r:hald_dccm_t:s0 tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=sock_file
node=localhost.localdomain type=AVC msg=audit(1237576627.907:393): avc: denied { connectto } for pid=11756 comm="hal-dccm" path="/var/run/dbus/system_bus_socket" scontext=system_u:system_r:hald_dccm_t:s0 tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tclass=unix_stream_socket
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.907:393): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcb28a0 a2=87bff4 a3=1f items=0 ppid=2129 pid=11756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="hal-dccm" exe="/usr/libexec/hal-dccm" subj=system_u:system_r:hald_dccm_t:s0 key=(null)
SELinux is preventing pppd (hald_t) "read" ./pap-secrets (pppd_secret_t).
Additional Information:
Source Context system_u:system_r:hald_t Target Context system_u:object_r:pppd_secret_t Target Objects ./pap-secrets [ file ] Source pppd Source Path /usr/sbin/pppd Port <Unknown> Host localhost.localdomain Source RPM Packages ppp-2.4.4-8.fc10 Target RPM Packages Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall_file Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 1 First Seen Fri Mar 20 20:17:08 2009 Last Seen Fri Mar 20 20:17:08 2009 Local ID 8790ca12-4cd3-468f-917b-b29956652895 Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576628.453:394): avc: denied { read } for pid=11771 comm="pppd" name="pap-secrets" dev=dm-0 ino=360200 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:pppd_secret_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576628.453:394): arch=40000003 syscall=5 success=yes exit=11 a0=a135e5 a1=0 a2=1b6 a3=0 items=0 ppid=1 pid=11771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=ttyUSB0 ses=4294967295 comm="pppd" exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0 key=(null)
SELinux is preventing pppd (hald_t) "getattr" /etc/ppp/pap-secrets (pppd_secret_t).
Additional Information:
Source Context system_u:system_r:hald_t Target Context system_u:object_r:pppd_secret_t Target Objects /etc/ppp/pap-secrets [ file ] Source pppd Source Path /usr/sbin/pppd Port <Unknown> Host localhost.localdomain Source RPM Packages ppp-2.4.4-8.fc10 Target RPM Packages ppp-2.4.4-8.fc10 Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall_file Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 1 First Seen Fri Mar 20 20:17:08 2009 Last Seen Fri Mar 20 20:17:08 2009 Local ID a4d794e1-18d5-41fd-a755-2f68eb4aefc4 Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576628.453:395): avc: denied { getattr } for pid=11771 comm="pppd" path="/etc/ppp/pap-secrets" dev=dm-0 ino=360200 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:pppd_secret_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576628.453:395): arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bfa6f1c4 a2=40eff4 a3=a135e5 items=0 ppid=1 pid=11771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=ttyUSB0 ses=4294967295 comm="pppd" exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0 key=(null)
SELinux is preventing pppd (hald_t) "getattr" /etc/ppp/ip-up (pppd_initrc_exec_t).
Additional Information:
Source Context system_u:system_r:hald_t Target Context system_u:object_r:pppd_initrc_exec_t Target Objects /etc/ppp/ip-up [ file ] Source pppd Source Path /usr/sbin/pppd Port <Unknown> Host localhost.localdomain Source RPM Packages ppp-2.4.4-8.fc10 Target RPM Packages initscripts-8.86-1 Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall_file Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 2 First Seen Fri Mar 20 19:13:18 2009 Last Seen Fri Mar 20 20:17:08 2009 Local ID 231cc7e5-6eb3-4cb8-8f3c-f901c9e464b8 Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576628.498:396): avc: denied { getattr } for pid=11771 comm="pppd" path="/etc/ppp/ip-up" dev=dm-0 ino=361994 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:pppd_initrc_exec_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576628.498:396): arch=40000003 syscall=195 success=yes exit=0 a0=a12036 a1=bfa6f584 a2=40eff4 a3=bfa6f6d8 items=0 ppid=1 pid=11771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=ttyUSB0 ses=4294967295 comm="pppd" exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0 key=(null)
SELinux is preventing ip-up (hald_t) "execute" ./ip-up (pppd_initrc_exec_t).
Additional Information:
Source Context system_u:system_r:hald_t Target Context system_u:object_r:pppd_initrc_exec_t Target Objects ./ip-up [ file ] Source ip-up Source Path /bin/bash Port <Unknown> Host localhost.localdomain Source RPM Packages bash-3.2-30.fc10 Target RPM Packages Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall_file Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 2 First Seen Fri Mar 20 19:13:18 2009 Last Seen Fri Mar 20 20:17:08 2009 Local ID 9c0bf4d7-e98d-46b5-8e98-b727169803af Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576628.498:397): avc: denied { execute } for pid=11784 comm="pppd" name="ip-up" dev=dm-0 ino=361994 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:pppd_initrc_exec_t:s0 tclass=file
node=localhost.localdomain type=AVC msg=audit(1237576628.498:397): avc: denied { read } for pid=11784 comm="pppd" name="ip-up" dev=dm-0 ino=361994 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:pppd_initrc_exec_t:s0 tclass=file
node=localhost.localdomain type=AVC msg=audit(1237576628.498:397): avc: denied { execute_no_trans } for pid=11784 comm="pppd" path="/etc/ppp/ip-up" dev=dm-0 ino=361994 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:pppd_initrc_exec_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576628.498:397): arch=40000003 syscall=11 success=yes exit=0 a0=a12036 a1=bfa6f6b8 a2=e0e018 a3=0 items=0 ppid=11771 pid=11784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip-up" exe="/bin/bash" subj=system_u:system_r:hald_t:s0 key=(null)
SELinux is preventing ip-up (hald_t) "ioctl" /etc/ppp/ip-up (pppd_initrc_exec_t).
Additional Information:
Source Context system_u:system_r:hald_t Target Context system_u:object_r:pppd_initrc_exec_t Target Objects /etc/ppp/ip-up [ file ] Source ip-up Source Path /bin/bash Port <Unknown> Host localhost.localdomain Source RPM Packages bash-3.2-30.fc10 Target RPM Packages initscripts-8.86-1 Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall_file Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 2 First Seen Fri Mar 20 19:13:18 2009 Last Seen Fri Mar 20 20:17:08 2009 Local ID 0ec7c0de-0086-4c13-b618-bf4858af6f41 Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576628.500:398): avc: denied { ioctl } for pid=11784 comm="ip-up" path="/etc/ppp/ip-up" dev=dm-0 ino=361994 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:pppd_initrc_exec_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576628.500:398): arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bf832bd8 a3=bf832c18 items=0 ppid=11771 pid=11784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip-up" exe="/bin/bash" subj=system_u:system_r:hald_t:s0 key=(null)
SELinux is preventing hal-dccm (hald_dccm_t) "write" hald_dccm_t.
Additional Information:
Source Context system_u:system_r:hald_dccm_t Target Context system_u:system_r:hald_dccm_t Target Objects None [ unix_dgram_socket ] Source hal-dccm Source Path /usr/libexec/hal-dccm Port <Unknown> Host localhost.localdomain Source RPM Packages synce-hal-0.1-1.fc10 Target RPM Packages Policy RPM selinux-policy-3.5.13-48.fc10 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall Host Name localhost.localdomain Platform Linux localhost.localdomain 2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon Feb 23 13:21:22 EST 2009 i686 i686 Alert Count 3 First Seen Fri Mar 20 19:13:18 2009 Last Seen Fri Mar 20 20:17:08 2009 Local ID bc1a16c5-af3f-42c0-9563-62a8cdf9eb69 Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576628.514:405): avc: denied { write } for pid=11756 comm="hal-dccm" scontext=system_u:system_r:hald_dccm_t:s0 tcontext=system_u:system_r:hald_dccm_t:s0 tclass=unix_dgram_socket
node=localhost.localdomain type=SYSCALL msg=audit(1237576628.514:405): arch=40000003 syscall=102 success=yes exit=86 a0=9 a1=bfcb23f4 a2=6aeff4 a3=14 items=0 ppid=2129 pid=11756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="hal-dccm" exe="/usr/libexec/hal-dccm" subj=system_u:system_r:hald_dccm_t:s0 key=(null)
Albert
selinux@lists.fedoraproject.org