Summary: SELinux is preventing mcelog (dmesg_t) "read" memory_device_t. Detailed Description: SELinux denied access requested by mcelog. It is not expected that this access is required by mcelog and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable SELinux protection altogether. Disabling SELinux protection is not recommended. Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Additional Information: Source Context system_u:system_r:dmesg_t:SystemLow-SystemHigh Target Context system_u:object_r:memory_device_t:SystemLow Target Objects mem [ chr_file ] Source mcelog Source Path /usr/sbin/mcelog Port <Unknown> Host (removed) Source RPM Packages mcelog-0.7-3.fc11 Target RPM Packages Policy RPM selinux-policy-3.6.12-88.fc11 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.31.5-127.fc12.x86_64 #1 SMP Sat Nov 7 21:11:14 EST 2009 x86_64 x86_64 Alert Count 1 First Seen Sun 22 Nov 2009 09:01:02 GMT Last Seen Sun 22 Nov 2009 09:01:02 GMT Local ID 9dabf32d-0d0e-467f-a291-9241d44c1214 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1258880462.724:630): avc: denied { read } for pid=24538 comm="mcelog" name="mem" dev=tmpfs ino=3073 scontext=system_u:system_r:dmesg_t:s0-s0:c0.c1023 tcontext=system_u:object_r:memory_device_t:s0 tclass=chr_file node=(removed) type=SYSCALL msg=audit(1258880462.724:630): arch=c000003e syscall=2 success=no exit=-13 a0=409e28 a1=0 a2=1000 a3=7fffaa63d6e0 items=0 ppid=24536 pid=24538 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="mcelog" exe="/usr/sbin/mcelog" subj=system_u:system_r:dmesg_t:s0-s0:c0.c1023 key=(null) Hash String generated from selinux-policy-3.6.12-88.fc11,catchall,mcelog,dmesg_t,memory_device_t,chr_file,read audit2allow suggests: #============= dmesg_t ============== allow dmesg_t memory_device_t:chr_file read;
*** This bug has been marked as a duplicate of bug 538428 ***