| Summary: | SELinux is preventing /bin/dbus-daemon from 'write' accesses on the None /run/systemd/sessions/2.ref. | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Horst H. von Brand <vonbrand> |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 16 | CC: | dominick.grift, dwalsh, mgrepl |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Unspecified | ||
| Whiteboard: | abrt_hash:e071ea535e731d266d94a51129c1aff6c46aba4ebe84585ebe17079fcb82efd3 | ||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2012-02-27 11:42:00 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
*** This bug has been marked as a duplicate of bug 797531 *** |
libreport version: 2.0.8 executable: /usr/bin/python hashmarkername: setroubleshoot kernel: 3.2.7-1.fc16.x86_64 reason: SELinux is preventing /bin/dbus-daemon from 'write' accesses on the None /run/systemd/sessions/2.ref. time: Sun 26 Feb 2012 01:05:22 PM CLST description: :SELinux is preventing /bin/dbus-daemon from 'write' accesses on the None /run/systemd/sessions/2.ref. : :***** Plugin catchall (100. confidence) suggests *************************** : :If you believe that dbus-daemon should be allowed write access on the 2.ref <Unknown> by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep dbus-daemon /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 :Target Context system_u:object_r:init_var_run_t:s0 :Target Objects /run/systemd/sessions/2.ref [ None ] :Source dbus-daemon :Source Path /bin/dbus-daemon :Port <Unknown> :Host (removed) :Source RPM Packages dbus-1.4.10-3.fc16.x86_64 :Target RPM Packages :Policy RPM selinux-policy-3.10.0-75.fc16.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Enforcing :Host Name (removed) :Platform Linux (removed) 3.2.1-3.fc16.x86_64 #1 : SMP Mon Jan 23 15:36:17 UTC 2012 x86_64 x86_64 :Alert Count 1 :First Seen Sun 26 Feb 2012 12:01:08 PM CLST :Last Seen Sun 26 Feb 2012 12:01:08 PM CLST :Local ID 9731ece9-d58e-4e2a-9522-52c1cbda0f86 : :Raw Audit Messages :type=AVC msg=audit(1330268468.287:206): avc: denied { write } for pid=967 comm="dbus-daemon" path="/run/systemd/sessions/2.ref" dev=tmpfs ino=30324 scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:init_var_run_t:s0 tclass=fifo_filenode=(removed) type=SYSCALL msg=audit(1330268468.287:206): arch=c000003e syscall=47 success=yes exit=152 a0=3c a1=7fff81690080 a2=40000000 a3=0 items=0 ppid=1 pid=967 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/bin/dbus-daemon" subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) : : :Hash: dbus-daemon,system_dbusd_t,init_var_run_t,None,write : :audit2allow : : :audit2allow -R : :