Summary: SELinux is preventing avahi-dnsconfd. (avahi_t) "read" proc_t. Detailed Description: [SELinux is in permissive mode. This access was not denied.] SELinux denied access requested by avahi-dnsconfd.. It is not expected that this access is required by avahi-dnsconfd. and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Additional Information: Source Context system_u:system_r:avahi_t:s0 Target Context system_u:object_r:proc_t:s0 Target Objects meminfo [ file ] Source avahi-dnsconfd. Source Path /bin/bash Port <Unknown> Host (removed) Source RPM Packages bash-4.0-8.fc11 Target RPM Packages Policy RPM selinux-policy-3.6.12-85.fc11 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Permissive Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.30.9-90.fc11.i586 #1 SMP Sat Oct 17 11:09:52 EDT 2009 i686 athlon Alert Count 2 First Seen Sat 07 Nov 2009 07:55:24 PM EET Last Seen Sat 07 Nov 2009 07:55:24 PM EET Local ID f7eca5e2-00e4-4bfd-95fa-3ce9321ccf00 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1257616524.831:128): avc: denied { read } for pid=4165 comm="avahi-dnsconfd." name="meminfo" dev=proc ino=4026531998 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file node=(removed) type=AVC msg=audit(1257616524.831:128): avc: denied { open } for pid=4165 comm="avahi-dnsconfd." name="meminfo" dev=proc ino=4026531998 scontext=system_u:system_r:avahi_t:s0 tcontext=system_u:object_r:proc_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1257616524.831:128): arch=40000003 syscall=5 success=yes exit=3 a0=817654 a1=0 a2=1b6 a3=9790a60 items=0 ppid=1803 pid=4165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="avahi-dnsconfd." exe="/bin/bash" subj=system_u:system_r:avahi_t:s0 key=(null) Hash String generated from selinux-policy-3.6.12-85.fc11,catchall,avahi-dnsconfd.,avahi_t,proc_t,file,read audit2allow suggests: #============= avahi_t ============== allow avahi_t proc_t:file { read open };
*** This bug has been marked as a duplicate of bug 538428 ***