Hi all!
It's my first post.
I last try to connect Palm to computer with F10 using synce-hal.
I got several selinux alerts.
All files has default context, pppd works fine with command line.
SELinux is preventing pppd (hald_t) "read" ./options (pppd_etc_rw_t).
Additional Information:
Source Context system_u:system_r:hald_t
Target Context system_u:object_r:pppd_etc_rw_t
Target Objects ./options [ file ]
Source pppd
Source Path /usr/sbin/pppd
Port <Unknown>
Host localhost.localdomain
Source RPM Packages ppp-2.4.4-8.fc10
Target RPM Packages
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall_file
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 2
First Seen Fri Mar 20 19:13:17 2009
Last Seen Fri Mar 20 20:17:07 2009
Local ID 746a1a3e-6177-42e3-9a45-44beb2856c56
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.818:385): avc:
denied { read } for pid=11770 comm="pppd" name="options" dev=dm-0
ino=360195 scontext=system_u:system_r:hald_t:s0
tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.818:385):
arch=40000003 syscall=5 success=yes exit=4 a0=a10303 a1=0 a2=1b6 a3=0
items=0 ppid=11756 pid=11770 auid=4294967295 uid=0 gid=0 euid=0 suid=0
fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="pppd"
exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0 key=(null)
SELinux is preventing pppd (hald_t) "getattr" /etc/ppp/options
(pppd_etc_rw_t).
Additional Information:
Source Context system_u:system_r:hald_t
Target Context system_u:object_r:pppd_etc_rw_t
Target Objects /etc/ppp/options [ file ]
Source pppd
Source Path /usr/sbin/pppd
Port <Unknown>
Host localhost.localdomain
Source RPM Packages ppp-2.4.4-8.fc10
Target RPM Packages ppp-2.4.4-8.fc10
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall_file
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 2
First Seen Fri Mar 20 19:13:17 2009
Last Seen Fri Mar 20 20:17:07 2009
Local ID c291b3a2-1c71-4baf-a2c5-f854f049f31a
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.818:386): avc:
denied { getattr } for pid=11770 comm="pppd"
path="/etc/ppp/options"
dev=dm-0 ino=360195 scontext=system_u:system_r:hald_t:s0
tcontext=system_u:object_r:pppd_etc_rw_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.818:386):
arch=40000003 syscall=197 success=yes exit=0 a0=4 a1=bfa6ee14 a2=40eff4
a3=e0e080 items=0 ppid=11756 pid=11770 auid=4294967295 uid=0 gid=0
euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295
comm="pppd" exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0
key=(null)
SELinux is preventing pppd (hald_t) "read write" ./pppd2.tdb
(pppd_var_run_t).
Additional Information:
Source Context system_u:system_r:hald_t
Target Context system_u:object_r:pppd_var_run_t
Target Objects ./pppd2.tdb [ file ]
Source pppd
Source Path /usr/sbin/pppd
Port <Unknown>
Host localhost.localdomain
Source RPM Packages ppp-2.4.4-8.fc10
Target RPM Packages
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall_file
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 2
First Seen Fri Mar 20 19:13:17 2009
Last Seen Fri Mar 20 20:17:07 2009
Local ID 1bef60ad-3bca-46eb-bb03-64983c6e80e0
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.878:387): avc:
denied { read write } for pid=11770 comm="pppd" name="pppd2.tdb"
dev=dm-0 ino=5272278 scontext=system_u:system_r:hald_t:s0
tcontext=system_u:object_r:pppd_var_run_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.878:387):
arch=40000003 syscall=5 success=yes exit=7 a0=a10333 a1=42 a2=1a4 a3=0
items=0 ppid=11756 pid=11770 auid=4294967295 uid=0 gid=0 euid=0 suid=0
fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="pppd"
exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0 key=(null)
SELinux is preventing pppd (hald_t) "getattr" /var/run/pppd2.tdb
(pppd_var_run_t).
Additional Information:
Source Context system_u:system_r:hald_t
Target Context system_u:object_r:pppd_var_run_t
Target Objects /var/run/pppd2.tdb [ file ]
Source pppd
Source Path /usr/sbin/pppd
Port <Unknown>
Host localhost.localdomain
Source RPM Packages ppp-2.4.4-8.fc10
Target RPM Packages
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall_file
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 2
First Seen Fri Mar 20 19:13:17 2009
Last Seen Fri Mar 20 20:17:07 2009
Local ID 07544813-1176-427b-ab4a-dded6daaf56e
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.878:388): avc:
denied { getattr } for pid=11770 comm="pppd"
path="/var/run/pppd2.tdb"
dev=dm-0 ino=5272278 scontext=system_u:system_r:hald_t:s0
tcontext=system_u:object_r:pppd_var_run_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.878:388):
arch=40000003 syscall=197 success=yes exit=0 a0=7 a1=bfa6f674 a2=40eff4
a3=e10f98 items=0 ppid=11756 pid=11770 auid=4294967295 uid=0 gid=0
euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295
comm="pppd" exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0
key=(null)
SELinux is preventing pppd (hald_t) "create" ./LCK..ttyUSB0
(var_lock_t).
Additional Information:
Source Context system_u:system_r:hald_t
Target Context system_u:object_r:var_lock_t
Target Objects ./LCK..ttyUSB0 [ file ]
Source pppd
Source Path /usr/sbin/pppd
Port <Unknown>
Host localhost.localdomain
Source RPM Packages ppp-2.4.4-8.fc10
Target RPM Packages
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall_file
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 2
First Seen Fri Mar 20 19:13:17 2009
Last Seen Fri Mar 20 20:17:07 2009
Local ID e59e15b8-a651-430a-9581-79bd1e36e4f7
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.879:389): avc:
denied { create } for pid=11771 comm="pppd" name="LCK..ttyUSB0"
scontext=system_u:system_r:hald_t:s0
tcontext=system_u:object_r:var_lock_t:s0 tclass=file
node=localhost.localdomain type=AVC msg=audit(1237576627.879:389): avc:
denied { read write } for pid=11771 comm="pppd" name="LCK..ttyUSB0"
dev=dm-0 ino=5265361 scontext=system_u:system_r:hald_t:s0
tcontext=system_u:object_r:var_lock_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.879:389):
arch=40000003 syscall=5 success=yes exit=8 a0=a27520 a1=c2 a2=1a4
a3=bfa6e6ec items=0 ppid=1 pid=11771 auid=4294967295 uid=0 gid=0 euid=0
suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295
comm="pppd" exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0
key=(null)
SELinux is preventing hal-dccm (hald_dccm_t) "getattr" hald_dccm_t.
Additional Information:
Source Context system_u:system_r:hald_dccm_t
Target Context system_u:system_r:hald_dccm_t
Target Objects pipe [ fifo_file ]
Source hal-dccm
Source Path /usr/libexec/hal-dccm
Port <Unknown>
Host localhost.localdomain
Source RPM Packages synce-hal-0.1-1.fc10
Target RPM Packages
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 2
First Seen Fri Mar 20 19:13:17 2009
Last Seen Fri Mar 20 20:17:07 2009
Local ID 03e073b1-7c9a-41d6-9eea-c736309b5f8f
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.903:390): avc:
denied { getattr } for pid=11756 comm="hal-dccm"
path="pipe:[209228]"
dev=pipefs ino=209228 scontext=system_u:system_r:hald_dccm_t:s0
tcontext=system_u:system_r:hald_dccm_t:s0 tclass=fifo_file
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.903:390):
arch=40000003 syscall=197 success=yes exit=0 a0=5 a1=bfcb2aac a2=6aeff4
a3=5 items=0 ppid=2129 pid=11756 auid=4294967295 uid=0 gid=0 euid=0
suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295
comm="hal-dccm" exe="/usr/libexec/hal-dccm"
subj=system_u:system_r:hald_dccm_t:s0 key=(null)
SELinux is preventing hal-dccm (hald_dccm_t) "create" hald_dccm_t.
Additional Information:
Source Context system_u:system_r:hald_dccm_t
Target Context system_u:system_r:hald_dccm_t
Target Objects None [ unix_dgram_socket ]
Source hal-dccm
Source Path /usr/libexec/hal-dccm
Port <Unknown>
Host localhost.localdomain
Source RPM Packages synce-hal-0.1-1.fc10
Target RPM Packages
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 2
First Seen Fri Mar 20 19:13:17 2009
Last Seen Fri Mar 20 20:17:07 2009
Local ID c1f75682-ab61-46ea-85f2-3e081eedfc01
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.903:391): avc:
denied { create } for pid=11756 comm="hal-dccm"
scontext=system_u:system_r:hald_dccm_t:s0
tcontext=system_u:system_r:hald_dccm_t:s0 tclass=unix_dgram_socket
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.903:391):
arch=40000003 syscall=102 success=yes exit=0 a0=1 a1=bfcb2540 a2=6aeff4
a3=6b23cc items=0 ppid=2129 pid=11756 auid=4294967295 uid=0 gid=0 euid=0
suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295
comm="hal-dccm" exe="/usr/libexec/hal-dccm"
subj=system_u:system_r:hald_dccm_t:s0 key=(null)
SELinux is preventing hal-dccm (hald_dccm_t) "connect" hald_dccm_t.
Additional Information:
Source Context system_u:system_r:hald_dccm_t
Target Context system_u:system_r:hald_dccm_t
Target Objects None [ unix_dgram_socket ]
Source hal-dccm
Source Path /usr/libexec/hal-dccm
Port <Unknown>
Host localhost.localdomain
Source RPM Packages synce-hal-0.1-1.fc10
Target RPM Packages
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 2
First Seen Fri Mar 20 19:13:17 2009
Last Seen Fri Mar 20 20:17:07 2009
Local ID b2c25766-1a6d-4453-a81b-9a895be0a06b
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.903:392): avc:
denied { connect } for pid=11756 comm="hal-dccm"
scontext=system_u:system_r:hald_dccm_t:s0
tcontext=system_u:system_r:hald_dccm_t:s0 tclass=unix_dgram_socket
node=localhost.localdomain type=AVC msg=audit(1237576627.903:392): avc:
denied { write } for pid=11756 comm="hal-dccm" name="log" dev=tmpfs
ino=7412 scontext=system_u:system_r:hald_dccm_t:s0
tcontext=system_u:object_r:devlog_t:s0 tclass=sock_file
node=localhost.localdomain type=AVC msg=audit(1237576627.903:392): avc:
denied { sendto } for pid=11756 comm="hal-dccm" path="/dev/log"
scontext=system_u:system_r:hald_dccm_t:s0
tcontext=system_u:system_r:syslogd_t:s0 tclass=unix_dgram_socket
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.903:392):
arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcb2540 a2=6aeff4
a3=0 items=0 ppid=2129 pid=11756 auid=4294967295 uid=0 gid=0 euid=0
suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295
comm="hal-dccm" exe="/usr/libexec/hal-dccm"
subj=system_u:system_r:hald_dccm_t:s0 key=(null)
SELinux is preventing hal-dccm (hald_dccm_t) "search" ./dbus
(system_dbusd_var_run_t).
Additional Information:
Source Context system_u:system_r:hald_dccm_t
Target Context system_u:object_r:system_dbusd_var_run_t
Target Objects ./dbus [ dir ]
Source hal-dccm
Source Path /usr/libexec/hal-dccm
Port <Unknown>
Host localhost.localdomain
Source RPM Packages synce-hal-0.1-1.fc10
Target RPM Packages
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall_file
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 2
First Seen Fri Mar 20 19:13:17 2009
Last Seen Fri Mar 20 20:17:07 2009
Local ID 418b2252-1561-4209-ba8d-8ed9f4917c7b
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576627.907:393): avc:
denied { search } for pid=11756 comm="hal-dccm" name="dbus"
dev=dm-0
ino=5265901 scontext=system_u:system_r:hald_dccm_t:s0
tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=dir
node=localhost.localdomain type=AVC msg=audit(1237576627.907:393): avc:
denied { write } for pid=11756 comm="hal-dccm"
name="system_bus_socket" dev=dm-0 ino=5265775
scontext=system_u:system_r:hald_dccm_t:s0
tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=sock_file
node=localhost.localdomain type=AVC msg=audit(1237576627.907:393): avc:
denied { connectto } for pid=11756 comm="hal-dccm"
path="/var/run/dbus/system_bus_socket"
scontext=system_u:system_r:hald_dccm_t:s0
tcontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023
tclass=unix_stream_socket
node=localhost.localdomain type=SYSCALL msg=audit(1237576627.907:393):
arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfcb28a0 a2=87bff4
a3=1f items=0 ppid=2129 pid=11756 auid=4294967295 uid=0 gid=0 euid=0
suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295
comm="hal-dccm" exe="/usr/libexec/hal-dccm"
subj=system_u:system_r:hald_dccm_t:s0 key=(null)
SELinux is preventing pppd (hald_t) "read" ./pap-secrets
(pppd_secret_t).
Additional Information:
Source Context system_u:system_r:hald_t
Target Context system_u:object_r:pppd_secret_t
Target Objects ./pap-secrets [ file ]
Source pppd
Source Path /usr/sbin/pppd
Port <Unknown>
Host localhost.localdomain
Source RPM Packages ppp-2.4.4-8.fc10
Target RPM Packages
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall_file
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 1
First Seen Fri Mar 20 20:17:08 2009
Last Seen Fri Mar 20 20:17:08 2009
Local ID 8790ca12-4cd3-468f-917b-b29956652895
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576628.453:394): avc:
denied { read } for pid=11771 comm="pppd" name="pap-secrets"
dev=dm-0
ino=360200 scontext=system_u:system_r:hald_t:s0
tcontext=system_u:object_r:pppd_secret_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576628.453:394):
arch=40000003 syscall=5 success=yes exit=11 a0=a135e5 a1=0 a2=1b6 a3=0
items=0 ppid=1 pid=11771 auid=4294967295 uid=0 gid=0 euid=0 suid=0
fsuid=0 egid=0 sgid=0 fsgid=0 tty=ttyUSB0 ses=4294967295 comm="pppd"
exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0 key=(null)
SELinux is preventing pppd (hald_t) "getattr" /etc/ppp/pap-secrets
(pppd_secret_t).
Additional Information:
Source Context system_u:system_r:hald_t
Target Context system_u:object_r:pppd_secret_t
Target Objects /etc/ppp/pap-secrets [ file ]
Source pppd
Source Path /usr/sbin/pppd
Port <Unknown>
Host localhost.localdomain
Source RPM Packages ppp-2.4.4-8.fc10
Target RPM Packages ppp-2.4.4-8.fc10
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall_file
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 1
First Seen Fri Mar 20 20:17:08 2009
Last Seen Fri Mar 20 20:17:08 2009
Local ID a4d794e1-18d5-41fd-a755-2f68eb4aefc4
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576628.453:395): avc:
denied { getattr } for pid=11771 comm="pppd"
path="/etc/ppp/pap-secrets" dev=dm-0 ino=360200
scontext=system_u:system_r:hald_t:s0
tcontext=system_u:object_r:pppd_secret_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576628.453:395):
arch=40000003 syscall=197 success=yes exit=0 a0=b a1=bfa6f1c4 a2=40eff4
a3=a135e5 items=0 ppid=1 pid=11771 auid=4294967295 uid=0 gid=0 euid=0
suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=ttyUSB0 ses=4294967295
comm="pppd" exe="/usr/sbin/pppd" subj=system_u:system_r:hald_t:s0
key=(null)
SELinux is preventing pppd (hald_t) "getattr" /etc/ppp/ip-up
(pppd_initrc_exec_t).
Additional Information:
Source Context system_u:system_r:hald_t
Target Context system_u:object_r:pppd_initrc_exec_t
Target Objects /etc/ppp/ip-up [ file ]
Source pppd
Source Path /usr/sbin/pppd
Port <Unknown>
Host localhost.localdomain
Source RPM Packages ppp-2.4.4-8.fc10
Target RPM Packages initscripts-8.86-1
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall_file
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 2
First Seen Fri Mar 20 19:13:18 2009
Last Seen Fri Mar 20 20:17:08 2009
Local ID 231cc7e5-6eb3-4cb8-8f3c-f901c9e464b8
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576628.498:396): avc:
denied { getattr } for pid=11771 comm="pppd" path="/etc/ppp/ip-up"
dev=dm-0 ino=361994 scontext=system_u:system_r:hald_t:s0
tcontext=system_u:object_r:pppd_initrc_exec_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576628.498:396):
arch=40000003 syscall=195 success=yes exit=0 a0=a12036 a1=bfa6f584
a2=40eff4 a3=bfa6f6d8 items=0 ppid=1 pid=11771 auid=4294967295 uid=0
gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=ttyUSB0
ses=4294967295 comm="pppd" exe="/usr/sbin/pppd"
subj=system_u:system_r:hald_t:s0 key=(null)
SELinux is preventing ip-up (hald_t) "execute" ./ip-up
(pppd_initrc_exec_t).
Additional Information:
Source Context system_u:system_r:hald_t
Target Context system_u:object_r:pppd_initrc_exec_t
Target Objects ./ip-up [ file ]
Source ip-up
Source Path /bin/bash
Port <Unknown>
Host localhost.localdomain
Source RPM Packages bash-3.2-30.fc10
Target RPM Packages
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall_file
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 2
First Seen Fri Mar 20 19:13:18 2009
Last Seen Fri Mar 20 20:17:08 2009
Local ID 9c0bf4d7-e98d-46b5-8e98-b727169803af
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576628.498:397): avc:
denied { execute } for pid=11784 comm="pppd" name="ip-up" dev=dm-0
ino=361994 scontext=system_u:system_r:hald_t:s0
tcontext=system_u:object_r:pppd_initrc_exec_t:s0 tclass=file
node=localhost.localdomain type=AVC msg=audit(1237576628.498:397): avc:
denied { read } for pid=11784 comm="pppd" name="ip-up" dev=dm-0
ino=361994 scontext=system_u:system_r:hald_t:s0
tcontext=system_u:object_r:pppd_initrc_exec_t:s0 tclass=file
node=localhost.localdomain type=AVC msg=audit(1237576628.498:397): avc:
denied { execute_no_trans } for pid=11784 comm="pppd"
path="/etc/ppp/ip-up" dev=dm-0 ino=361994
scontext=system_u:system_r:hald_t:s0
tcontext=system_u:object_r:pppd_initrc_exec_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576628.498:397):
arch=40000003 syscall=11 success=yes exit=0 a0=a12036 a1=bfa6f6b8
a2=e0e018 a3=0 items=0 ppid=11771 pid=11784 auid=4294967295 uid=0 gid=0
euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295
comm="ip-up" exe="/bin/bash" subj=system_u:system_r:hald_t:s0
key=(null)
SELinux is preventing ip-up (hald_t) "ioctl" /etc/ppp/ip-up
(pppd_initrc_exec_t).
Additional Information:
Source Context system_u:system_r:hald_t
Target Context system_u:object_r:pppd_initrc_exec_t
Target Objects /etc/ppp/ip-up [ file ]
Source ip-up
Source Path /bin/bash
Port <Unknown>
Host localhost.localdomain
Source RPM Packages bash-3.2-30.fc10
Target RPM Packages initscripts-8.86-1
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall_file
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 2
First Seen Fri Mar 20 19:13:18 2009
Last Seen Fri Mar 20 20:17:08 2009
Local ID 0ec7c0de-0086-4c13-b618-bf4858af6f41
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576628.500:398): avc:
denied { ioctl } for pid=11784 comm="ip-up" path="/etc/ppp/ip-up"
dev=dm-0 ino=361994 scontext=system_u:system_r:hald_t:s0
tcontext=system_u:object_r:pppd_initrc_exec_t:s0 tclass=file
node=localhost.localdomain type=SYSCALL msg=audit(1237576628.500:398):
arch=40000003 syscall=54 success=no exit=-25 a0=3 a1=5401 a2=bf832bd8
a3=bf832c18 items=0 ppid=11771 pid=11784 auid=4294967295 uid=0 gid=0
euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295
comm="ip-up" exe="/bin/bash" subj=system_u:system_r:hald_t:s0
key=(null)
SELinux is preventing hal-dccm (hald_dccm_t) "write" hald_dccm_t.
Additional Information:
Source Context system_u:system_r:hald_dccm_t
Target Context system_u:system_r:hald_dccm_t
Target Objects None [ unix_dgram_socket ]
Source hal-dccm
Source Path /usr/libexec/hal-dccm
Port <Unknown>
Host localhost.localdomain
Source RPM Packages synce-hal-0.1-1.fc10
Target RPM Packages
Policy RPM selinux-policy-3.5.13-48.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Permissive
Plugin Name catchall
Host Name localhost.localdomain
Platform Linux localhost.localdomain
2.6.27.19-170.2.35.fc10.i686 #1 SMP Mon
Feb 23
13:21:22 EST 2009 i686 i686
Alert Count 3
First Seen Fri Mar 20 19:13:18 2009
Last Seen Fri Mar 20 20:17:08 2009
Local ID bc1a16c5-af3f-42c0-9563-62a8cdf9eb69
Line Numbers
Raw Audit Messages
node=localhost.localdomain type=AVC msg=audit(1237576628.514:405): avc:
denied { write } for pid=11756 comm="hal-dccm"
scontext=system_u:system_r:hald_dccm_t:s0
tcontext=system_u:system_r:hald_dccm_t:s0 tclass=unix_dgram_socket
node=localhost.localdomain type=SYSCALL msg=audit(1237576628.514:405):
arch=40000003 syscall=102 success=yes exit=86 a0=9 a1=bfcb23f4 a2=6aeff4
a3=14 items=0 ppid=2129 pid=11756 auid=4294967295 uid=0 gid=0 euid=0
suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295
comm="hal-dccm" exe="/usr/libexec/hal-dccm"
subj=system_u:system_r:hald_dccm_t:s0 key=(null)
Albert
Show replies by thread