abrt version: 2.0.3 architecture: i686 cmdline: /usr/bin/python -Es /usr/bin/sealert -s comment: Try to report an selinux avc component: setroubleshoot executable: /usr/bin/sealert kernel: 2.6.38.8-32.fc15.i686 os_release: Fedora release 15 (Lovelock) package: setroubleshoot-server-3.0.35-1.fc15 reason: browser.py:947:submit:AttributeError: 'module' object has no attribute 'GTKIO' time: Sat Jun 25 23:05:02 2011 uid: 500 username: hicham backtrace: :browser.py:947:submit:AttributeError: 'module' object has no attribute 'GTKIO' : :Traceback (most recent call last): : File "/usr/lib/python2.7/site-packages/setroubleshoot/browser.py", line 932, in submit_button_clicked : self.submit() : File "/usr/lib/python2.7/site-packages/setroubleshoot/browser.py", line 947, in submit : rc = report.report(signature, report.io.GTKIO.GTKIO(self.parent.accounts)) :AttributeError: 'module' object has no attribute 'GTKIO' : :Local variables in innermost frame: :content: 'SELinux is preventing /usr/sbin/pppd from \'search\' accesses on the directory /var/lock.\n\n***** Plugin catchall (100. confidence) suggests ***************************\n\nIf you believe that pppd should be allowed search access on the lock directory by default.\nThen you should report this as a bug.\nYou can generate a local policy module to allow this access.\nDo\nallow this access for now by executing:\n# grep pppd /var/log/audit/audit.log | audit2allow -M mypol\n# semodule -i mypol.pp\n\nAdditional Information:\nSource Context system_u:system_r:pppd_t:s0\nTarget Context system_u:object_r:var_lock_t:s0\nTarget Objects /var/lock [ dir ]\nSource pppd\nSource Path /usr/sbin/pppd\nPort <Unknown>\nHost (removed)\nSource RPM Packages ppp-2.4.5-17.fc15\nTarget RPM Packages filesystem-2.4.41-1.fc15\nPolicy RPM selinux-policy-3.9.16-30.fc15\nSelinux Enabled True\nPolicy Type targeted\nEnforcing Mode Permissive\nHost Name (removed)\nPlatform Linux (removed) 2.6.38.8-32.fc15.i686 #1 SMP\n Mon Jun 13 20:01:50 UTC 2011 i686 i686\nAlert Count 3\nFirst Seen Sat 25 Jun 2011 10:57:16 PM WEST\nLast Seen Sat 25 Jun 2011 10:59:19 PM WEST\nLocal ID c34a9c57-0e03-4d05-9b1e-1c72a3820749\n\nRaw Audit Messages\ntype=AVC msg=audit(1309039159.967:100): avc: denied { search } for pid=3897 comm="pppd" name="lock" dev=tmpfs ino=6236 scontext=system_u:system_r:pppd_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=dir\n\n\ntype=SYSCALL msg=audit(1309039159.967:100): arch=i386 syscall=open success=yes exit=EAGAIN a0=bcb760 a1=800c2 a2=1a4 a3=bcb760 items=0 ppid=630 pid=3897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=pppd exe=/usr/sbin/pppd subj=system_u:system_r:pppd_t:s0 key=(null)\n\nHash: pppd,pppd_t,var_lock_t,dir,search\n\naudit2allow\n\n#============= pppd_t ==============\nallow pppd_t var_lock_t:dir search;\n\naudit2allow -R\n\n#============= pppd_t ==============\nallow pppd_t var_lock_t:dir search;\n\n' :self: <setroubleshoot.browser.BugReport instance at 0xaceb94c> :text_buf: <gtk.TextBuffer object at 0xacdd2d4 (GtkTextBuffer at 0xadb6a10)> :signature: {'localhash': <report.StringSignatureValue instance at 0x98d56ec>, 'product': <report.StringSignatureValue instance at 0xacf26ac>, 'description': <report.StringSignatureValue instance at 0xacf286c>, 'component': <report.StringSignatureValue instance at 0x98d58ec>, 'summary': <report.StringSignatureValue instance at 0x98d554c>, 'version': <report.StringSignatureValue instance at 0xacf2e8c>, 'hashmarkername': <report.StringSignatureValue instance at 0x98d5a8c>}
*** This bug has been marked as a duplicate of bug 715373 ***