The following was filed automatically by setroubleshoot: Summary: SELinux is preventing the dbus-daemon from using potentially mislabeled files (root). Detailed Description: SELinux has denied dbus-daemon access to potentially mislabeled file(s) (root). This means that SELinux will not allow dbus-daemon to use these files. It is common for users to edit files in their home directory or tmp directories and then move (mv) them to system directories. The problem is that the files end up with the wrong file context which confined applications are not allowed to access. Allowing Access: If you want dbus-daemon to access this files, you need to relabel them using restorecon -v 'root'. You might want to relabel the entire directory using restorecon -R -v 'root'. Additional Information: Source Context system_u:system_r:xdm_dbusd_t:s0-s0:c0.c1023 Target Context system_u:object_r:admin_home_t:s0 Target Objects root [ dir ] Source dbus-daemon Source Path /bin/dbus-daemon Port <Unknown> Host (removed) Source RPM Packages dbus-1.2.16-4.fc12 Target RPM Packages filesystem-2.4.27-1.fc12 Policy RPM selinux-policy-3.6.26-8.fc12 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name home_tmp_bad_labels Host Name (removed) Platform Linux (removed) 2.6.31-0.125.rc5.git2.fc12.x86_64 #1 SMP Tue Aug 4 02:59:17 EDT 2009 x86_64 x86_64 Alert Count 1 First Seen Thu 13 Aug 2009 07:41:50 AM EDT Last Seen Thu 13 Aug 2009 07:41:50 AM EDT Local ID c7ecc933-4258-4276-8ccd-30ffc2b31d8a Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1250163710.576:30513): avc: denied { search } for pid=2199 comm="dbus-daemon" name="root" dev=dm-0 ino=24587 scontext=system_u:system_r:xdm_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:admin_home_t:s0 tclass=dir node=(removed) type=SYSCALL msg=audit(1250163710.576:30513): arch=c000003e syscall=2 success=yes exit=0 a0=7fc8f20d5ee0 a1=90800 a2=1 a3=0 items=0 ppid=2198 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/bin/dbus-daemon" subj=system_u:system_r:xdm_dbusd_t:s0-s0:c0.c1023 key=(null) audit2allow suggests: #============= xdm_dbusd_t ============== allow xdm_dbusd_t admin_home_t:dir search;
happened when testing recent f12-kde live image, when doing suspend/resume.
This is dontaudited in selinux-policy-3.6.26-10.fc12.noarch