Description of problem: SELinux is preventing /usr/sbin/rngd from 'execmod' accesses on the file . ***** Plugin catchall (100. confidence) suggests ************************** If si crede che rngd dovrebbe avere possibilità di accesso execmod sui file in modo predefinito. Then si dovrebbe riportare il problema come bug. E' possibile generare un modulo di politica locale per consentire questo accesso. Do consentire questo accesso per il momento eseguendo: # grep rngd /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:rngd_t:s0 Target Context system_u:object_r:rngd_exec_t:s0 Target Objects [ file ] Source rngd Source Path /usr/sbin/rngd Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.12.1-197.fc20.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 3.19.8-100.fc20.i686+PAE #1 SMP Tue May 12 17:27:49 UTC 2015 i686 i686 Alert Count 22 First Seen 1980-01-04 01:01:33 CET Last Seen 2015-11-05 03:16:11 CET Local ID 1f28b327-efe7-44b8-8d31-d31021fe7913 Raw Audit Messages type=AVC msg=audit(1446689771.469:8): avc: denied { execmod } for pid=623 comm="rngd" path="/usr/sbin/rngd" dev="dm-0" ino=405664 scontext=system_u:system_r:rngd_t:s0 tcontext=system_u:object_r:rngd_exec_t:s0 tclass=file permissive=1 Hash: rngd,rngd_t,rngd_exec_t,file,execmod Additional info: reporter: libreport-2.2.3 hashmarkername: setroubleshoot kernel: 3.19.8-100.fc20.i686+PAE type: libreport Potential duplicate: bug 1181308
This bug is currently assigned to an unsupported release. If you think this bug is still valid and should remain open, please re-assign it to a supported release (F22, F23) or to rawhide. Bugs which will be assigned to an unsupported release are going to be closed as EOL (End Of Life) on January 26th, 2016.