SELinux is preventing /usr/sbin/NetworkManager from using the 'signull' accesses on a process. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that NetworkManager should be allowed signull access on processes labeled dhcpc_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep NetworkManager /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:NetworkManager_t:s0 Target Context system_u:system_r:dhcpc_t:s0 Target Objects Unknown [ process ] Source NetworkManager Source Path /usr/sbin/NetworkManager Port <Unknown> Host (removed) Source RPM Packages NetworkManager-0.8.3.996-1.fc14 Target RPM Packages Policy RPM selinux-policy-3.9.7-31.fc14 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 2.6.35.11-83.fc14.i686 #1 SMP Mon Feb 7 07:04:18 UTC 2011 i686 i686 Alert Count 1 First Seen Wed 02 Mar 2011 06:02:19 PM EST Last Seen Wed 02 Mar 2011 06:02:19 PM EST Local ID bc2f8164-48a7-435b-ab23-bf51aba92e5c Raw Audit Messages type=AVC msg=audit(1299106939.125:12): avc: denied { signull } for pid=1531 comm="NetworkManager" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=process type=SYSCALL msg=audit(1299106939.125:12): arch=i386 syscall=kill success=no exit=EACCES a0=532 a1=0 a2=8103ad0 a3=532 items=0 ppid=1 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=NetworkManager exe=/usr/sbin/NetworkManager subj=system_u:system_r:NetworkManager_t:s0 key=(null) Hash: NetworkManager,NetworkManager_t,dhcpc_t,process,signull audit2allow #============= NetworkManager_t ============== allow NetworkManager_t dhcpc_t:process signull; audit2allow -R #============= NetworkManager_t ============== allow NetworkManager_t dhcpc_t:process signull;
This just occurred after network managers update which was installed today. This has never been a problem before, so something in the update must be the cause of this problem.
Miroslav I added this to F15, we probably should add to F13, F14, RHEL6
Fixed in selinux-policy-3.9.7-33.fc14
selinux-policy-3.9.7-34.fc14 has been submitted as an update for Fedora 14. https://admin.fedoraproject.org/updates/selinux-policy-3.9.7-34.fc14
selinux-policy-3.9.7-37.fc14 has been submitted as an update for Fedora 14. https://admin.fedoraproject.org/updates/selinux-policy-3.9.7-37.fc14
selinux-policy-3.9.7-37.fc14 has been pushed to the Fedora 14 stable repository. If problems still persist, please make note of it in this bug report.