libreport version: 2.0.10 executable: /usr/bin/python2.7 hashmarkername: setroubleshoot kernel: 3.3.7-1.fc17.x86_64 time: Tue 29 May 2012 01:00:40 PM CEST description: :SELinux is preventing /usr/sbin/tmpwatch from 'setattr' accesses on the directory systemd-namespace-xi2CXa. : :***** Plugin file (36.8 confidence) suggests ******************************* : :If you think this is caused by a badly mislabeled machine. :Then you need to fully relabel. :Do :touch /.autorelabel; reboot : :***** Plugin file (36.8 confidence) suggests ******************************* : :If you think this is caused by a badly mislabeled machine. :Then you need to fully relabel. :Do :touch /.autorelabel; reboot : :***** Plugin catchall_labels (23.2 confidence) suggests ******************** : :If you want to allow tmpwatch to have setattr access on the systemd-namespace-xi2CXa directory :Then you need to change the label on systemd-namespace-xi2CXa :Do :# semanage fcontext -a -t FILE_TYPE 'systemd-namespace-xi2CXa' :where FILE_TYPE is one of the following: man_t, usr_t, tmpfile, sandbox_file_t, kismet_log_t, rpm_var_cache_t, httpd_cache_t, user_home_type, print_spool_t, amavis_spool_t. :Then execute: :restorecon -v 'systemd-namespace-xi2CXa' : : :***** Plugin catchall (5.04 confidence) suggests *************************** : :If you believe that tmpwatch should be allowed setattr access on the systemd-namespace-xi2CXa directory by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep tmpwatch /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 :Target Context system_u:object_r:file_t:s0 :Target Objects systemd-namespace-xi2CXa [ dir ] :Source tmpwatch :Source Path /usr/sbin/tmpwatch :Port <Unknown> :Host (removed) :Source RPM Packages tmpwatch-2.10.3-2.fc17.x86_64 :Target RPM Packages :Policy RPM selinux-policy-3.10.0-125.fc17.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Enforcing :Host Name (removed) :Platform Linux (removed) 3.3.7-1.fc17.x86_64 #1 : SMP Mon May 21 22:32:19 UTC 2012 x86_64 x86_64 :Alert Count 12 :First Seen Mon 28 May 2012 09:45:09 AM CEST :Last Seen Tue 29 May 2012 09:45:12 AM CEST :Local ID 60f6454a-0209-4b3c-a23f-fd55706f5249 : :Raw Audit Messages :type=AVC msg=audit(1338277512.792:136): avc: denied { setattr } for pid=5979 comm="tmpwatch" name="systemd-namespace-xi2CXa" dev="sda2" ino=523410 scontext=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir : : :type=SYSCALL msg=audit(1338277512.792:136): arch=x86_64 syscall=utime success=no exit=EACCES a0=404a07 a1=7fffd01da360 a2=7f7a01316f98 a3=7f7a01316778 items=0 ppid=5977 pid=5979 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3 comm=tmpwatch exe=/usr/sbin/tmpwatch subj=system_u:system_r:tmpreaper_t:s0-s0:c0.c1023 key=(null) : :Hash: tmpwatch,tmpreaper_t,file_t,dir,setattr : :audit2allowunable to open /sys/fs/selinux/policy: Permission denied : : :audit2allow -Runable to open /sys/fs/selinux/policy: Permission denied : :
I think something was wrong with your machine. Is this still issue? if yes, please reopen the bug. Thanks.
*** Bug 874109 has been marked as a duplicate of this bug. ***
Hi, why exactly is this closed as not a bug? How can I reopen this bug report? How to get rid of the selinux audit message?!
Took a long time to respond. It looks like your machine has files in /tmp without labels.systemd-namespace-xi2CXa to be exact, Remove this file or all files in /tmp and /var/tmp and then the problem should go away. You can reopen a bug by changing the status to assigned.