Description of problem: Seen on boot after a Rawhide system update. The update did not include iio-sensor-proxy, but did include a libselinux update from 3.7-6 to 3.7-7. SELinux is preventing iio-sensor-prox from 'write' accesses on the file current_trigger. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iio-sensor-prox should be allowed write access on the current_trigger file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iio-sensor-prox' --raw | audit2allow -M my-iiosensorprox # semodule -X 300 -i my-iiosensorprox.pp Additional Information: Source Context system_u:system_r:iiosensorproxy_t:s0 Target Context system_u:object_r:sysfs_t:s0 Target Objects current_trigger [ file ] Source iio-sensor-prox Source Path iio-sensor-prox Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages SELinux Policy RPM selinux-policy-targeted-41.26-1.fc42.noarch Local Policy RPM selinux-policy-targeted-41.26-1.fc42.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 6.13.0-0.rc0.20241119git158f238aa69d.2.fc42.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Nov 19 16:33:57 UTC 2024 x86_64 Alert Count 104 First Seen 2024-10-07 13:42:02 PDT Last Seen 2024-12-04 16:32:16 PST Local ID d1ae1ce4-028a-4d3f-9c87-f7dc88fb1666 Raw Audit Messages type=AVC msg=audit(1733358736.783:182): avc: denied { write } for pid=1657 comm="iio-sensor-prox" name="current_trigger" dev="sysfs" ino=61882 scontext=system_u:system_r:iiosensorproxy_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=file permissive=0 Hash: iio-sensor-prox,iiosensorproxy_t,sysfs_t,file,write Version-Release number of selected component: selinux-policy-targeted-41.26-1.fc42.noarch Additional info: reporter: libreport-2.17.15 reason: SELinux is preventing iio-sensor-prox from 'write' accesses on the file current_trigger. package: selinux-policy-targeted-41.26-1.fc42.noarch component: selinux-policy hashmarkername: setroubleshoot type: libreport kernel: 6.13.0-0.rc0.20241119git158f238aa69d.2.fc42.x86_64 comment: Seen on boot after a Rawhide system update. The update did not include iio-sensor-proxy, but did include a libselinux update from 3.7-6 to 3.7-7. component: selinux-policy
Created attachment 2061264 [details] File: description
Created attachment 2061265 [details] File: os_info
There are a couple of other similar denials: === 1 === Additional Information: Source Context system_u:system_r:iiosensorproxy_t:s0 Target Context system_u:object_r:sysfs_t:s0 Target Objects trigger [ dir ] Source iio-sensor-prox Source Path iio-sensor-prox Port <Unknown> Host xps13a.happyassassin.net Source RPM Packages Target RPM Packages SELinux Policy RPM selinux-policy-targeted-41.26-1.fc42.noarch Local Policy RPM selinux-policy-targeted-41.26-1.fc42.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name xps13a.happyassassin.net Platform Linux xps13a.happyassassin.net 6.13.0-0.rc0.20241119git158f238aa69d.2.fc42.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Nov 19 16:33:57 UTC 2024 x86_64 Alert Count 26 First Seen 2024-10-07 13:42:02 PDT Last Seen 2024-12-04 16:32:16 PST Local ID 2a787417-5bf7-4add-be69-2617bee02ecd Raw Audit Messages type=AVC msg=audit(1733358736.783:181): avc: denied { write } for pid=1657 comm="iio-sensor-prox" name="trigger" dev="sysfs" ino=61881 scontext=system_u:system_r:iiosensorproxy_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=dir permissive=0 Hash: iio-sensor-prox,iiosensorproxy_t,sysfs_t,dir,write === 2 === Additional Information: Source Context system_u:system_r:iiosensorproxy_t:s0 Target Context system_u:object_r:syslogd_var_run_t:s0 Target Objects journal [ dir ] Source iio-sensor-prox Source Path iio-sensor-prox Port <Unknown> Host xps13a.happyassassin.net Source RPM Packages Target RPM Packages SELinux Policy RPM selinux-policy-targeted-41.26-1.fc42.noarch Local Policy RPM selinux-policy-targeted-41.26-1.fc42.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name xps13a.happyassassin.net Platform Linux xps13a.happyassassin.net 6.13.0-0.rc0.20241119git158f238aa69d.2.fc42.x86_64 #1 SMP PREEMPT_DYNAMIC Tue Nov 19 16:33:57 UTC 2024 x86_64 Alert Count 60 First Seen 2024-11-25 16:32:21 PST Last Seen 2024-12-04 16:32:16 PST Local ID ef183791-38cf-4969-a098-4bea6bbdda58 Raw Audit Messages type=AVC msg=audit(1733358736.783:180): avc: denied { search } for pid=1657 comm="iio-sensor-prox" name="journal" dev="tmpfs" ino=52 scontext=system_u:system_r:iiosensorproxy_t:s0 tcontext=system_u:object_r:syslogd_var_run_t:s0 tclass=dir permissive=0 Hash: iio-sensor-prox,iiosensorproxy_t,syslogd_var_run_t,dir,search
*** This bug has been marked as a duplicate of bug 2324181 ***