The following was filed automatically by setroubleshoot: Summary: SELinux is preventing abrt (initrc_t) "lock" var_t. Detailed Description: [SELinux is in permissive mode, the operation would have been denied but was permitted due to permissive mode.] SELinux denied access requested by abrt. It is not expected that this access is required by abrt and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package. Additional Information: Source Context unconfined_u:system_r:initrc_t:s0 Target Context unconfined_u:object_r:var_t:s0 Target Objects /var/cache/abrt/abrt-db [ file ] Source abrt Source Path /usr/sbin/abrt Port <Unknown> Host (removed) Source RPM Packages abrt-0.0.7.1-1.fc12 Target RPM Packages Policy RPM selinux-policy-3.6.28-2.fc12 Selinux Enabled True Policy Type targeted MLS Enabled True Enforcing Mode Enforcing Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.31-0.162.rc6.git2.fc12.x86_64 #1 SMP Mon Aug 17 16:06:42 EDT 2009 x86_64 x86_64 Alert Count 1 First Seen Fri 21 Aug 2009 04:58:05 PM EDT Last Seen Fri 21 Aug 2009 04:58:05 PM EDT Local ID a9b84fae-1a21-4ace-ba1b-650d8e4c00a1 Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1250888285.558:24615): avc: denied { lock } for pid=7776 comm="abrt" path="/var/cache/abrt/abrt-db" dev=dm-0 ino=216247 scontext=unconfined_u:system_r:initrc_t:s0 tcontext=unconfined_u:object_r:var_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1250888285.558:24615): arch=c000003e syscall=72 success=yes exit=0 a0=6 a1=6 a2=7fff8ef29850 a3=8 items=0 ppid=1 pid=7776 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="abrt" exe="/usr/sbin/abrt" subj=unconfined_u:system_r:initrc_t:s0 key=(null) audit2allow suggests: #============= initrc_t ============== allow initrc_t var_t:file lock;
Fixed in selinux-policy-3.6.28-4.fc12.noarch