SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.
SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.
What does that mean? What exactly is abrt-hook-cppp?
Here is some more info:
SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.
***** Plugin catchall (100. confidence) suggests **************************
If you believe that abrt-hook-ccpp should be allowed sigchld access on processes labeled kernel_t by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep abrt-hook-ccpp /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context system_u:system_r:NetworkManager_t:s0
Target Context system_u:system_r:kernel_t:s0
Target Objects Unknown [ process ]
Source abrt-hook-ccpp
Source Path /usr/libexec/abrt-hook-ccpp
Port <Unknown>
Host hostname
Source RPM Packages abrt-addon-coredump-helper-2.6.1-5.fc22.x86_64
Target RPM Packages
Policy RPM selinux-policy-3.13.1-128.16.fc22.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name hostname
Platform Linux hostname 4.1.8-200.fc22.x86_64 #1 SMP
Tue Sep 22 12:13:21 UTC 2015 x86_64 x86_64
Alert Count 1
First Seen 2015-10-07 15:49:10 EDT
Last Seen 2015-10-07 15:49:10 EDT
Local ID 417e307d-249e-4861-9115-091d49449665
Raw Audit Messages
type=AVC msg=audit(1444247350.947:1250): avc: denied { sigchld } for pid=20805 comm="abrt-hook-ccpp" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=0
Looks like you're correct to me; upgrade that comment to an answer and answer your own question!