libreport version: 2.0.10 executable: /usr/bin/python2.7 hashmarkername: setroubleshoot kernel: 3.3.4-5.fc17.i686 time: Tue 03 Jul 2012 08:42:32 PM PDT description: :SELinux is preventing lspci from using the 'sys_admin' capabilities. : :***** Plugin catchall (100. confidence) suggests *************************** : :If you believe that lspci should have the sys_admin capability by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep lspci /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context system_u:system_r:sectoolm_t:s0-s0:c0.c1023 :Target Context system_u:system_r:sectoolm_t:s0-s0:c0.c1023 :Target Objects [ capability ] :Source lspci :Source Path lspci :Port <Unknown> :Host (removed) :Source RPM Packages :Target RPM Packages :Policy RPM selinux-policy-3.10.0-121.fc17.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Enforcing :Host Name (removed) :Platform Linux (removed) 3.3.4-5.fc17.i686 #1 : SMP Mon May 7 17:45:26 UTC 2012 i686 i686 :Alert Count 15 :First Seen Tue 03 Jul 2012 08:30:21 PM PDT :Last Seen Tue 03 Jul 2012 08:33:24 PM PDT :Local ID 6987b5fc-1e13-4f3f-98b9-5a4d85081479 : :Raw Audit Messages :type=AVC msg=audit(1341372804.988:2641): avc: denied { sys_admin } for pid=6561 comm="lspci" capability=21 scontext=system_u:system_r:sectoolm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:sectoolm_t:s0-s0:c0.c1023 tclass=capability : : :Hash: lspci,sectoolm_t,sectoolm_t,capability,sys_admin : :audit2allowunable to open /sys/fs/selinux/policy: Permission denied : : :audit2allow -Runable to open /sys/fs/selinux/policy: Permission denied : :
Please update your system. # yum update