Description of problem:
SELinux is preventing gdbus from 'write' accesses on the fifo_file /run/systemd/inhibit/4.ref.
***** Plugin catchall (100. confidence) suggests **************************
If you believe that gdbus should be allowed write access on the 4.ref fifo_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus
# semodule -X 300 -i my-gdbus.pp
Additional Information:
Source Context system_u:system_r:init_t:s0
Target Context system_u:object_r:systemd_logind_inhibit_var_run_t
:s0
Target Objects /run/systemd/inhibit/4.ref [ fifo_file ]
Source gdbus
Source Path gdbus
Port <Unknown>
Host (removed)
Source RPM Packages
Target RPM Packages
Policy RPM selinux-policy-3.14.2-25.fc29.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name (removed)
Platform Linux (removed) 4.18.0-0.rc0.git9.1.fc29.x86_64 #1
SMP Thu Jun 14 18:07:49 UTC 2018 x86_64 x86_64
Alert Count 5
First Seen 2018-06-21 20:30:28 +05
Last Seen 2018-06-21 20:35:57 +05
Local ID 7838474b-d2b9-478c-94c4-d20bccc3fedd
Raw Audit Messages
type=AVC msg=audit(1529595357.106:181): avc: denied { write } for pid=1193 comm="gdbus" path="/run/systemd/inhibit/4.ref" dev="tmpfs" ino=35867 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:systemd_logind_inhibit_var_run_t:s0 tclass=fifo_file permissive=0
Hash: gdbus,init_t,systemd_logind_inhibit_var_run_t,fifo_file,write
Version-Release number of selected component:
selinux-policy-3.14.2-25.fc29.noarch
Additional info:
component: selinux-policy
reporter: libreport-2.9.5
hashmarkername: setroubleshoot
kernel: 4.18.0-0.rc0.git9.1.fc29.x86_64
type: libreport
Comment 4Fedora Update System
2018-09-12 02:58:45 UTC
selinux-policy-3.14.2-34.fc29 has been pushed to the Fedora 29 stable repository. If problems still persist, please make note of it in this bug report.
Description of problem: SELinux is preventing gdbus from 'write' accesses on the fifo_file /run/systemd/inhibit/4.ref. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that gdbus should be allowed write access on the 4.ref fifo_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'gdbus' --raw | audit2allow -M my-gdbus # semodule -X 300 -i my-gdbus.pp Additional Information: Source Context system_u:system_r:init_t:s0 Target Context system_u:object_r:systemd_logind_inhibit_var_run_t :s0 Target Objects /run/systemd/inhibit/4.ref [ fifo_file ] Source gdbus Source Path gdbus Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.14.2-25.fc29.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 4.18.0-0.rc0.git9.1.fc29.x86_64 #1 SMP Thu Jun 14 18:07:49 UTC 2018 x86_64 x86_64 Alert Count 5 First Seen 2018-06-21 20:30:28 +05 Last Seen 2018-06-21 20:35:57 +05 Local ID 7838474b-d2b9-478c-94c4-d20bccc3fedd Raw Audit Messages type=AVC msg=audit(1529595357.106:181): avc: denied { write } for pid=1193 comm="gdbus" path="/run/systemd/inhibit/4.ref" dev="tmpfs" ino=35867 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:systemd_logind_inhibit_var_run_t:s0 tclass=fifo_file permissive=0 Hash: gdbus,init_t,systemd_logind_inhibit_var_run_t,fifo_file,write Version-Release number of selected component: selinux-policy-3.14.2-25.fc29.noarch Additional info: component: selinux-policy reporter: libreport-2.9.5 hashmarkername: setroubleshoot kernel: 4.18.0-0.rc0.git9.1.fc29.x86_64 type: libreport