Hide Forgot
[ntpd has a permissive type (ntpd_t). This access was not denied.] SELinux denied access requested by the ntpd command. It looks like this is either a leaked descriptor or ntpd output was redirected to a file it is not allowed to access. Leaks usually can be ignored since SELinux is just closing the leak and reporting the error. The application does not use the descriptor, so it will run properly. If this is a redirection, you will not get output in the netlink_route_socket. You should generate a bugzilla on selinux-policy, and it will get routed to the appropriate package. You can safely ignore this avc. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Additional Information: Source Context system_u:system_r:ntpd_t:s0 Target Context system_u:system_r:firstboot_t:s0 Target Objects netlink_route_socket [ netlink_route_socket ] Source ntpd Source Path /usr/sbin/ntpd Port <Unknown> Host <Host Name> Source RPM Packages ntp-4.2.6p2-7.fc14 Target RPM Packages Policy RPM selinux-policy-3.9.7-3.fc14 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name leaks Host Name <Host Name> Platform Linux <Host Name> 2.6.35.6-45.fc14.i686 #1 SMP Mon Oct 18 23:56:17 UTC 2010 i686 i686 Alert Count 1 First Seen Wed 30 Mar 2011 03:42:45 PM IST Last Seen Wed 30 Mar 2011 03:42:45 PM IST Local ID 0e2aa8c4-2337-4f83-92e2-1dc09dcd7950 Line Numbers Raw Audit Messages node=<Host Name> type=AVC msg=audit(1301479965.229:15): avc: denied { read write } for pid=1527 comm="ntpd" path="socket:[14048]" dev=sockfs ino=14048 scontext=system_u:system_r:ntpd_t:s0 tcontext=system_u:system_r:firstboot_t:s0 tclass=netlink_route_socket node=<Host Name> type=SYSCALL msg=audit(1301479965.229:15): arch=40000003 syscall=11 success=yes exit=0 a0=8bdcd40 a1=8bdd020 a2=8bdd2a8 a3=8bdd020 items=0 ppid=1526 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ntpd" exe="/usr/sbin/ntpd" subj=system_u:system_r:ntpd_t:s0 key=(null)
Did this happen on install, after first boot?
Yes, This Happened the first time I logged in after first Boot
I think it is fixed in the latest code. You should yum update.
*** Bug 695834 has been marked as a duplicate of this bug. ***