Summary: SELinux is preventing /sbin/shutdown "connectto" access on @/com/ubuntu/upstart. Detailed Description: [shutdown has a permissive type (shutdown_t). This access was not denied.] SELinux denied access requested by shutdown. It is not expected that this access is required by shutdown and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context system_u:system_r:shutdown_t:s0-s0:c0.c1023 Target Context system_u:system_r:init_t:s0 Target Objects @/com/ubuntu/upstart [ unix_stream_socket ] Source shutdown Source Path /sbin/shutdown Port <Unknown> Host (removed) Source RPM Packages upstart-0.6.5-3.fc13 Target RPM Packages Policy RPM selinux-policy-3.7.15-4.fc13 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux local 2.6.33.2-46.fc13.i686.PAE #1 SMP Wed Apr 14 13:42:15 UTC 2010 i686 i686 Alert Count 31 First Seen Wed 14 Apr 2010 10:30:25 PM CEST Last Seen Fri 16 Apr 2010 10:29:02 PM CEST Local ID b5fba049-42cf-483f-8976-4ed5d9e7ced4 Line Numbers Raw Audit Messages node=local type=SYSCALL msg=audit(1271449742.489:22275): arch=40000003 syscall=102 success=yes exit=0 a0=3 a1=bfe10070 a2=7ebff4 a3=bfe1021c items=0 ppid=2965 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="shutdown" exe="/sbin/shutdown" subj=system_u:system_r:shutdown_t:s0-s0:c0.c1023 key=(null) node=local type=AVC msg=audit(1271449742.489:22275): avc: denied { connectto } for pid=2968 comm="shutdown" path=002F636F6D2F7562756E74752F75707374617274 scontext=system_u:system_r:shutdown_t:s0-s0:c0.c1023 tcontext=system_u:system_r:init_t:s0 tclass=unix_stream_socket Hash String generated from catchall,shutdown,shutdown_t,init_t,unix_stream_socket,connectto audit2allow suggests: #============= shutdown_t ============== allow shutdown_t init_t:unix_stream_socket connectto;
See bug 581112. This can only be reported with setroubleshoot-2.2.73-1.fc13.i686. The avc should be fixed in selinux-policy-3.7.19-2.