If you believe that abrt-handle-event should be allowed open access on the file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep abrt-handle-eve /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context system_u:system_r:abrt_t:s0-s0:c0.c1023
Target Context system_u:object_r:var_spool_t:s0
Target Objects [ file ]
Source abrt-handle-eve
Source Path /usr/libexec/abrt-handle-event
Port <Unknown>
Host localhost.localdomain
Source RPM Packages abrt-2.1.11-12.el7.centos.x86_64
Target RPM Packages
Policy RPM selinux-policy-3.12.1-153.el7.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name localhost.localdomain
Platform Linux localhost.localdomain 3.10.0-123.el7.x86_64
#1 SMP Mon Jun 30 12:09:22 UTC 2014 x86_64 x86_64
Alert Count 2
First Seen 2015-12-27 09:21:35 EST
Last Seen 2015-12-27 09:21:35 EST
Local ID 5f7559d5-313a-4f09-96c3-bea0c3fd67c5
Raw Audit Messages
type=AVC msg=audit(1451226095.531:608): avc: denied { open } for pid=17177 comm="abrt-handle-eve" path="/var/spool/abrt/ccpp-2015-12-27-09:21:35-883/time" dev="dm-1" ino=202708314 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_spool_t:s0 tclass=file
If you believe that abrt-handle-event should be allowed create access on the lnk_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep abrt-handle-eve /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context system_u:system_r:abrt_t:s0-s0:c0.c1023
Target Context system_u:object_r:var_spool_t:s0
Target Objects [ lnk_file ]
Source abrt-handle-eve
Source Path /usr/libexec/abrt-handle-event
Port <Unknown>
Host localhost.localdomain
Source RPM Packages abrt-2.1.11-12.el7.centos.x86_64
Target RPM Packages
Policy RPM selinux-policy-3.12.1-153.el7.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name localhost.localdomain
Platform Linux localhost.localdomain 3.10.0-123.el7.x86_64
#1 SMP Mon Jun 30 12:09:22 UTC 2014 x86_64 x86_64
Alert Count 4
First Seen 2015-12-27 09:21:35 EST
Last Seen 2015-12-27 09:21:35 EST
Local ID 8caf01b0-e3c6-4695-bf85-887026cb13af
Raw Audit Messages
type=AVC msg=audit(1451226095.534:610): avc: denied { create } for pid=17167 comm="abrt-server" name=".lock" scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_spool_t:s0 tclass=lnk_file
If you believe that systemd-logind should be allowed read access on the directory by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context system_u:system_r:systemd_logind_t:s0
Target Context system_u:object_r:tmpfs_t:s0
Target Objects [ dir ]
Source systemd-logind
Source Path /usr/lib/systemd/systemd-logind
Port <Unknown>
Host localhost.localdomain
Source RPM Packages systemd-208-11.el7.x86_64
systemd-219-19.el7.x86_64
Target RPM Packages
Policy RPM selinux-policy-3.12.1-153.el7.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name localhost.localdomain
Platform Linux localhost.localdomain 3.10.0-123.el7.x86_64
#1 SMP Mon Jun 30 12:09:22 UTC 2014 x86_64 x86_64
Alert Count 1
First Seen 2015-12-27 09:21:54 EST
Last Seen 2015-12-27 09:21:54 EST
Local ID e9da0e86-de1d-4784-93fa-f2cf68b23979
Raw Audit Messages
type=AVC msg=audit(1451226114.223:620): avc: denied { read } for pid=17173 comm="systemd-logind" name="/" dev="mqueue" ino=7612 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir
If you believe that systemd-logind should be allowed mounton access on the directory by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context system_u:system_r:systemd_logind_t:s0
Target Context system_ubject_r:user_tmp_t:s0
Target Objects [ dir ]
Source systemd-logind
Source Path /usr/lib/systemd/systemd-logind
Port <Unknown>
Host localhost.localdomain
Source RPM Packages systemd-208-11.el7.x86_64
systemd-219-19.el7.x86_64
Target RPM Packages
Policy RPM selinux-policy-3.12.1-153.el7.noarch selinux-
policy-3.13.1-60.el7.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name localhost.localdomain
Platform Linux localhost.localdomain 3.10.0-123.el7.x86_64
#1 SMP Mon Jun 30 12:09:22 UTC 2014 x86_64 x86_64
Alert Count 2
First Seen 2015-12-27 09:21:35 EST
Last Seen 2015-12-27 09:30:01 EST
Local ID 24895b84-2738-405b-91a6-e462387b530c
Raw Audit Messages
type=AVC msg=audit(1451226601.411:685): avc: denied { mounton } for pid=17173 comm="systemd-logind" path="/run/user/0" dev="tmpfs" ino=3042889 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_ubject_r:user_tmp_t:s0 tclass=dir