SELinux is preventing......

Eddie O'Connor eoconnor25 at gmail.com
Fri Feb 22 01:27:35 UTC 2013


Cool.....guess I'll just wait for it to update when my software update
kicks in...
On Feb 20, 2013 9:50 PM, "Eddie G. O'Connor Jr." <eoconnor25 at gmail.com>
wrote:

> I kep receiving messages like this every now and then....I'm just
> wondering.....should I be concerned? Is there something I need to do to get
> these alerts and warnings to cease? Any help would be appreciated!
>
> Thanx!
>
>
> EGO II
>
>
> SELinux is preventing /usr/lib/systemd/systemd-**hostnamed from open
> access on the file /sys/devices/virtual/dmi/id/**chassis_type.
>
> ***** Plugin catchall (100. confidence) suggests
> ***************************
>
> If you believe that systemd-hostnamed should be allowed open access on the
> chassis_type file by default.
> Then you should report this as a bug.
> You can generate a local policy module to allow this access.
> Do
> allow this access for now by executing:
> # grep systemd-hostnam /var/log/audit/audit.log | audit2allow -M mypol
> # semodule -i mypol.pp
>
> Additional Information:
> Source Context system_u:system_r:systemd_**hostnamed_t:s0
> Target Context system_u:object_r:sysfs_t:s0
> Target Objects /sys/devices/virtual/dmi/id/**chassis_type [ file ]
> Source systemd-hostnam
> Source Path /usr/lib/systemd/systemd-**hostnamed
> Port <Unknown>
> Host EDDIE2000
> Source RPM Packages systemd-197-1.fc18.1.i686
> Target RPM Packages
> Policy RPM selinux-policy-3.11.1-78.fc18.**noarch
> Selinux Enabled True
> Policy Type targeted
> Enforcing Mode Enforcing
> Host Name EDDIE2000
> Platform Linux 3.7.8-202.fc18.i686 #1 SMP Fri
> Feb 15 17:57:07 UTC 2013 i686 i686
> Alert Count 2
> First Seen 2013-02-20 21:46:01 EST
> Last Seen 2013-02-20 21:46:01 EST
> Local ID 667cee4a-e0d1-4fbd-8ce8-**a516e584b6c3
>
> Raw Audit Messages
> type=AVC msg=audit(1361414761.615:346): avc: denied { open } for pid=2333
> comm="systemd-hostnam" path="/sys/devices/virtual/**dmi/id/chassis_type"
> dev="sysfs" ino=156 scontext=system_u:system_r:**systemd_hostnamed_t:s0
> tcontext=system_u:object_r:**sysfs_t:s0 tclass=file
>
>
> type=SYSCALL msg=audit(1361414761.615:346): arch=i386 syscall=open
> success=no exit=EACCES a0=b77b0da4 a1=88000 a2=1b6 a3=b8ca4788 items=0
> ppid=1 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0
> sgid=0 fsgid=0 ses=4294967295 tty=(none) comm=systemd-hostnam
> exe=/usr/lib/systemd/systemd-**hostnamed subj=system_u:system_r:**systemd_hostnamed_t:s0
> key=(null)
>
> Hash: systemd-hostnam,systemd_**hostnamed_t,sysfs_t,file,open
>
> audit2allow
>
> #============= systemd_hostnamed_t ==============
> allow systemd_hostnamed_t sysfs_t:file open;
>
> audit2allow -R
>
> #============= systemd_hostnamed_t ==============
> allow systemd_hostnamed_t sysfs_t:file open;
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.fedoraproject.org/pipermail/users/attachments/20130221/2115bd0b/attachment.html>


More information about the users mailing list