Bug 2052102

Summary: avc: denied { write } for pid=1122 comm="gdm-wayland-ses" name="bus" dev="tmpfs" ino=32 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:session_dbusd_tmp_t:s0
Product: Red Hat Enterprise Linux 9 Reporter: Jan Stodola <jstodola>
Component: selinux-policyAssignee: Zdenek Pytela <zpytela>
Status: CLOSED DUPLICATE QA Contact: BaseOS QE Security Team <qe-baseos-security>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 9.0CC: lvrabec, mmalik, ssekidde
Target Milestone: rcFlags: pm-rhel: mirror+
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-02-08 18:49:02 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1942219    

Description Jan Stodola 2022-02-08 17:56:06 UTC
Description of problem:
The following SELinux denial is recorded after the default package set installation:

[root@localhost ~]# ausearch -m AVC -ts recent
----
time->Tue Feb  8 18:46:52 2022
type=PROCTITLE msg=audit(1644342412.718:72): proctitle=2F7573722F6C6962657865632F67646D2D7761796C616E642D73657373696F6E002D2D72656769737465722D73657373696F6E00646275732D72756E2D73657373696F6E202D2D20676E6F6D652D73657373696F6E202D2D6175746F7374617274202F7573722F73686172652F67646D2F677265657465722F6175746F737461
type=SYSCALL msg=audit(1644342412.718:72): arch=c000003e syscall=42 success=yes exit=0 a0=5 a1=7ffd6b64c7c0 a2=6e a3=0 items=0 ppid=999 pid=1122 auid=4294967295 uid=987 gid=982 euid=987 suid=987 fsuid=987 egid=982 sgid=982 fsgid=982 tty=tty1 ses=4294967295 comm="gdm-wayland-ses" exe="/usr/libexec/gdm-wayland-session" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1644342412.718:72): avc:  denied  { write } for  pid=1122 comm="gdm-wayland-ses" name="bus" dev="tmpfs" ino=32 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:session_dbusd_tmp_t:s0 tclass=sock_file permissive=1
[root@localhost ~]#

Version-Release number of selected component (if applicable):
RHEL-9.0.0-20220207.2
selinux-policy-34.1.23-1.el9

How reproducible:
Always

Steps to Reproduce:
1. Start graphical installation
2. Proceed through the installation, use the default package set "Server with GUI"
3. Login to the installed system and check reported SELinux issues

Actual results:
type=AVC msg=audit(1644342412.718:72): avc:  denied  { write } for  pid=1122 comm="gdm-wayland-ses" name="bus" dev="tmpfs" ino=32 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:session_dbusd_tmp_t:s0 tclass=sock_file permissive=1

Expected results:
No SELinux denials reported

Comment 2 Zdenek Pytela 2022-02-08 18:49:02 UTC

*** This bug has been marked as a duplicate of bug 2000039 ***