概述: SELinux is preventing /usr/bin/gdb "add_name" access on gobject.pyc. 详细描述: [gdb 有一个宽容类型 (abrt_t)。此访问未受拒绝。] SELinux denied access requested by gdb. It is not expected that this access is required by gdb and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. 允许访问: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. 附加信息: 源上下文 system_u:system_r:abrt_t:s0-s0:c0.c1023 目标上下文 system_u:object_r:usr_t:s0 目标对象 gobject.pyc [ dir ] 源 gdb 源路径 /usr/bin/gdb 端口 <未知> 主机 (removed) 源 RPM 软件包 gdb-7.0.1-35.fc12 目标 RPM 软件包 策略 RPM selinux-policy-3.6.32-103.fc12 启用 Selinux True 策略类型 targeted Enforcing 模式 Enforcing 插件名称 catchall 主机名 (removed) 平台 Linux (removed) 2.6.32.9-70.fc12.i686.PAE #1 SMP Wed Mar 3 04:57:21 UTC 2010 i686 i686 警报计数 3 第一个 2010年03月25日 星期四 10时40分42秒 最后一个 2010年03月25日 星期四 10时40分42秒 本地 ID 8fef01fe-1cb7-404d-a8ad-c195f0c7e53b 行号 原始核查信息 node=(removed) type=AVC msg=audit(1269484842.193:43): avc: denied { add_name } for pid=13002 comm="gdb" name="gobject.pyc" scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=dir node=(removed) type=AVC msg=audit(1269484842.193:43): avc: denied { create } for pid=13002 comm="gdb" name="gobject.pyc" scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=file node=(removed) type=AVC msg=audit(1269484842.193:43): avc: denied { write } for pid=13002 comm="gdb" name="gobject.pyc" dev=dm-0 ino=483 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usr_t:s0 tclass=file node=(removed) type=SYSCALL msg=audit(1269484842.193:43): arch=40000003 syscall=5 success=yes exit=14 a0=bfad3a8b a1=82c1 a2=81ed a3=bfad4aeb items=0 ppid=1872 pid=13002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="gdb" exe="/usr/bin/gdb" subj=system_u:system_r:abrt_t:s0-s0:c0.c1023 key=(null) Hash String generated from catchall,gdb,abrt_t,usr_t,dir,add_name audit2allow suggests: #============= abrt_t ============== allow abrt_t usr_t:dir add_name; allow abrt_t usr_t:file { write create };
*** This bug has been marked as a duplicate of bug 528554 ***