SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the 'dac_override' capabilities. ***** Plugin dac_override (91.4 confidence) suggests *********************** If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. ***** Plugin catchall (9.59 confidence) suggests *************************** If you believe that abrt-hook-ccpp should have the dac_override capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep abrt-hook-ccpp /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:abrt_helper_t:s0 Target Context system_u:system_r:abrt_helper_t:s0 Target Objects Unknown [ capability ] Source abrt-hook-ccpp Source Path /usr/libexec/abrt-hook-ccpp Port <Sconosciuto> Host (removed) Source RPM Packages abrt-addon-ccpp-2.0.3-1.fc15 Target RPM Packages Policy RPM selinux-policy-3.9.16-31.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 2.6.38.8-34.fc15.x86_64 #1 SMP Fri Jun 24 03:45:35 UTC 2011 x86_64 x86_64 Alert Count 1 First Seen ven 01 lug 2011 02:20:42 CEST Last Seen ven 01 lug 2011 02:20:42 CEST Local ID fdff19db-4526-4a11-8d85-1e13cdcfdd06 Raw Audit Messages type=AVC msg=audit(1309479642.299:104): avc: denied { dac_override } for pid=6365 comm="abrt-hook-ccpp" capability=1 scontext=system_u:system_r:abrt_helper_t:s0 tcontext=system_u:system_r:abrt_helper_t:s0 tclass=capability type=SYSCALL msg=audit(1309479642.299:104): arch=x86_64 syscall=mkdir success=yes exit=0 a0=fc76d0 a1=1e8 a2=0 a3=2d31302d37302d31 items=0 ppid=4608 pid=6365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=abrt-hook-ccpp exe=/usr/libexec/abrt-hook-ccpp subj=system_u:system_r:abrt_helper_t:s0 key=(null) Hash: abrt-hook-ccpp,abrt_helper_t,abrt_helper_t,capability,dac_override audit2allow #============= abrt_helper_t ============== allow abrt_helper_t self:capability dac_override; audit2allow -R #============= abrt_helper_t ============== allow abrt_helper_t self:capability dac_override;
Could you turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent Will add it.
Difficult, as it happened while abrt was trying to get a backtrace after a nautilus crash. I will try to reproduce it later today.
well, you don't need. I just wanted know what directory is created and where.
Fixed in selinux-policy-3.9.16-33.fc15
selinux-policy-3.9.16-34.fc15 has been submitted as an update for Fedora 15. https://admin.fedoraproject.org/updates/selinux-policy-3.9.16-34.fc15
Package selinux-policy-3.9.16-34.fc15: * should fix your issue, * was pushed to the Fedora 15 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.9.16-34.fc15' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/selinux-policy-3.9.16-34.fc15 then log in and leave karma (feedback).
selinux-policy-3.9.16-34.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.