Description of problem: # sealert -l bb9f32f0-5993-4e0d-ac18-dd4200ea9b02 SELinux is preventing rngd from execmod access on the file /usr/sbin/rngd. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that rngd should be allowed execmod access on the rngd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep rngd /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:rngd_t:s0 Target Context system_u:object_r:rngd_exec_t:s0 Target Objects /usr/sbin/rngd [ file ] Source rngd Source Path rngd Port <Unknown> Host mccallum Source RPM Packages Target RPM Packages rng-tools-5-4.fc22.i686 Policy RPM selinux-policy-3.13.1-122.fc22.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name mccallum Platform Linux mccallum 4.0.0-1.fc22.i686+PAE #1 SMP Mon Apr 13 10:26:13 UTC 2015 i686 i686 Alert Count 1 First Seen 2015-05-03 09:36:19 CEST Last Seen 2015-05-03 09:36:19 CEST Local ID bb9f32f0-5993-4e0d-ac18-dd4200ea9b02 Raw Audit Messages type=AVC msg=audit(1430638579.171:89): avc: denied { execmod } for pid=602 comm="rngd" path="/usr/sbin/rngd" dev="dm-1" ino=1182807 scontext=system_u:system_r:rngd_t:s0 tcontext=system_u:object_r:rngd_exec_t:s0 tclass=file permissive=0 Hash: rngd,rngd_t,rngd_exec_t,file,execmod Version-Release number of selected component (if applicable): selinux-policy-targeted-3.13.1-122.fc22.noarch
Fedora 22 changed to end-of-life (EOL) status on 2016-07-19. Fedora 22 is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of Fedora please feel free to reopen this bug against that version. If you are unable to reopen this bug, please file a new report against the current release. If you experience problems, please add a comment to this bug. Thank you for reporting this bug and we are sorry it could not be fixed.