This site requires JavaScript to be enabled to function correctly, please enable it.
Summary:
SELinux is preventing chkconfig from 'getattr' accesses on the file /bin/systemd.
Product:
[Fedora] Fedora
Reporter:
Michael Click <michael.click>
Component:
selinux-policy Assignee:
Miroslav Grepl <mgrepl>
Status:
CLOSED
ERRATA
QA Contact:
Fedora Extras Quality Assurance <extras-qa>
Severity:
unspecified
Docs Contact:
Priority:
unspecified
Version:
16 CC:
artemio.silva, buribullet, daniel-fedoauth, dominick.grift, dwalsh, f3lipel3al, info, jdh8, josian2200, marek90, marianboricean, martin, mgrepl, pe, pluhun, postawa, rockmagnetic, roneyd, sivlemx, szoke.karcsi
Target Milestone:
---
Target Release:
---
Hardware:
i686
OS:
Unspecified
Whiteboard:
abrt_hash:da9f5de5c6cf5a072457028ae089814d576d9d3318ab0de38376b4bb602bc009
Fixed In Version:
selinux-policy-3.10.0-84.fc16
Doc Type:
Bug Fix
Doc Text:
Story Points:
---
Clone Of:
Environment:
Last Closed:
2012-04-22 03:37:37 UTC
Type:
---
Regression:
---
Mount Type:
---
Documentation:
---
CRM:
Verified Versions:
Category:
---
oVirt Team:
---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team:
---
Target Upstream Version:
Embargoed:
libreport version: 2.0.8 executable: /usr/bin/python hashmarkername: setroubleshoot kernel: 3.3.0-4.fc16.i686 reason: SELinux is preventing chkconfig from 'getattr' accesses on the file /bin/systemd. time: Fri 23 Mar 2012 02:59:45 PM EDT description: :SELinux is preventing chkconfig from 'getattr' accesses on the file /bin/systemd. : :***** Plugin catchall (100. confidence) suggests *************************** : :If you believe that chkconfig should be allowed getattr access on the systemd file by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep chkconfig /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context system_u:system_r:gnomeclock_t:s0-s0:c0.c1023 :Target Context system_u:object_r:init_exec_t:s0 :Target Objects /bin/systemd [ file ] :Source chkconfig :Source Path chkconfig :Port <Unknown> :Host (removed) :Source RPM Packages :Target RPM Packages systemd-37-15.fc16.i686 :Policy RPM selinux-policy-3.10.0-75.fc16.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Enforcing :Host Name (removed) :Platform Linux (removed) 3.3.0-4.fc16.i686 #1 SMP Tue : Mar 20 18:45:14 UTC 2012 i686 i686 :Alert Count 1 :First Seen Fri 23 Mar 2012 02:59:08 PM EDT :Last Seen Fri 23 Mar 2012 02:59:08 PM EDT :Local ID ef399e9b-092a-416a-8a69-a555f4ed2a10 : :Raw Audit Messages :type=AVC msg=audit(1332529148.474:72): avc: denied { getattr } for pid=2944 comm="chkconfig" path="/bin/systemd" dev="dm-1" ino=9961 scontext=system_u:system_r:gnomeclock_t:s0-s0:c0.c1023 tcontext=system_u:object_r:init_exec_t:s0 tclass=file : : :Hash: chkconfig,gnomeclock_t,init_exec_t,file,getattr : :audit2allow : :#============= gnomeclock_t ============== :allow gnomeclock_t init_exec_t:file getattr; : :audit2allow -R : :#============= gnomeclock_t ============== :allow gnomeclock_t init_exec_t:file getattr; :