Description of problem: I usually can see it when someone sends me msg when I am not online and I receive them when I make account on. The instant msgs are often with diacritic, which might be re-coded, if that matter somehow. SELinux is preventing bitlbee (bitlbee_t) "read" to ./meminfo (proc_t). [...] Raw Audit Messages node=assam type=AVC msg=audit(1238094258.370:19): avc: denied { read } for pid=3149 comm="bitlbee" name="meminfo" dev=proc ino=4026531842 scontext=system_u:system_r:bitlbee_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_t:s0 tclass=file node=assam type=SYSCALL msg=audit(1238094258.370:19): arch=40000003 syscall=5 success=yes exit=5 a0=b29a1c a1=0 a2=1b6 a3=b29a1c items=0 ppid=2258 pid=3149 auid=4294967295 uid=495 gid=490 euid=495 suid=495 fsuid=495 egid=490 sgid=490 fsgid=490 tty=(none) ses=4294967295 comm="bitlbee" exe="/usr/sbin/bitlbee" subj=system_u:system_r:bitlbee_t:s0-s0:c0.c1023 key=(null) -- SELinux is preventing bitlbee (bitlbee_t) "getattr" to /proc/meminfo (proc_t). [...] Raw Audit Messages node=assam type=AVC msg=audit(1238094258.371:20): avc: denied { getattr } for pid=3149 comm="bitlbee" path="/proc/meminfo" dev=proc ino=4026531842 scontext=system_u:system_r:bitlbee_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_t:s0 tclass=file node=assam type=SYSCALL msg=audit(1238094258.371:20): arch=40000003 syscall=197 success=yes exit=0 a0=5 a1=bfba02e0 a2=b57ff4 a3=96e7ea8 items=0 ppid=2258 pid=3149 auid=4294967295 uid=495 gid=490 euid=495 suid=495 fsuid=495 egid=490 sgid=490 fsgid=490 tty=(none) ses=4294967295 comm="bitlbee" exe="/usr/sbin/bitlbee" subj=system_u:system_r:bitlbee_t:s0-s0:c0.c1023 key=(null) Version-Release number of selected component (if applicable): libselinux-python-2.0.78-1.fc10.i386 selinux-policy-targeted-3.5.13-52.fc10.noarch libselinux-2.0.78-1.fc10.i386 libselinux-devel-2.0.78-1.fc10.i386 libselinux-utils-2.0.78-1.fc10.i386 selinux-policy-3.5.13-52.fc10.noarch bitlbee-1.2.3-1.fc10.i386 How reproducible: alway
Created attachment 336913 [details] SELinux is preventing bitlbee (bitlbee_t) "read" to ./meminfo (proc_t).
Created attachment 336914 [details] SELinux is preventing bitlbee (bitlbee_t) "getattr" to /proc/meminfo (proc_t).
Miroslav add kernel_read_system_state(bitlbee_t)
Fixed in selinux-policy-3.5.13-54.fc10
Can we close this one?