Hide Forgot
SELinux is preventing /bin/dbus-daemon from 'execute' accesses on the file /usr/libexec/mission-control-5. This error just shown up on the startup of the system. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that dbus-daemon should be allowed execute access on the mission-control-5 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep dbus-daemon /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context staff_u:staff_r:staff_dbusd_t:s0-s0:c0.c1023 Target Context system_u:object_r:telepathy_mission_control_exec_t :s0 Target Objects /usr/libexec/mission-control-5 [ file ] Source dbus-daemon Source Path /bin/dbus-daemon Port <Neznámé> Host (removed) Source RPM Packages dbus-1.4.6-4.fc15 Target RPM Packages telepathy-mission-control-5.7.9-1.fc15 Policy RPM selinux-policy-3.9.16-21.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 2.6.38.5-22.fc15.x86_64 #1 SMP Mon May 2 19:28:55 UTC 2011 x86_64 x86_64 Alert Count 1 First Seen St 4. květen 2011, 10:58:48 CEST Last Seen St 4. květen 2011, 10:58:48 CEST Local ID 2c2b76d7-bae6-45c5-823d-c22b704bd9e5 Raw Audit Messages type=AVC msg=audit(1304499528.210:56): avc: denied { execute } for pid=2387 comm="dbus-daemon" name="mission-control-5" dev=dm-1 ino=46044 scontext=staff_u:staff_r:staff_dbusd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:telepathy_mission_control_exec_t:s0 tclass=file type=SYSCALL msg=audit(1304499528.210:56): arch=x86_64 syscall=execve success=no exit=EACCES a0=7f4b5687e0a0 a1=7f4b5687e310 a2=7f4b5687f130 a3=7fff144956c0 items=0 ppid=2386 pid=2387 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm=dbus-daemon exe=/bin/dbus-daemon subj=staff_u:staff_r:staff_dbusd_t:s0-s0:c0.c1023 key=(null) Hash: dbus-daemon,staff_dbusd_t,telepathy_mission_control_exec_t,file,execute audit2allow #============= staff_dbusd_t ============== allow staff_dbusd_t telepathy_mission_control_exec_t:file execute; audit2allow -R #============= staff_dbusd_t ============== allow staff_dbusd_t telepathy_mission_control_exec_t:file execute;
Will fix in selinux-policy-3.9.16-22.fc15