libreport version: 2.0.8 executable: /usr/bin/python hashmarkername: setroubleshoot kernel: 3.3.0-0.rc6.git0.2.fc17.x86_64 reason: SELinux is preventing /usr/lib64/dbus-1/dbus-daemon-launch-helper from 'connectto' accesses on the unix_stream_socket /var/lib/sss/pipes/nss. time: 2012-03-07T21:38:02 CET description: :SELinux is preventing /usr/lib64/dbus-1/dbus-daemon-launch-helper from 'connectto' accesses on the unix_stream_socket /var/lib/sss/pipes/nss. : :***** Plugin catchall (100. confidence) suggests *************************** : :If you believe that dbus-daemon-launch-helper should be allowed connectto access on the nss unix_stream_socket by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep dbus-daemon-lau /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 :Target Context unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1 : 023 :Target Objects /var/lib/sss/pipes/nss [ unix_stream_socket ] :Source dbus-daemon-lau :Source Path /usr/lib64/dbus-1/dbus-daemon-launch-helper :Port <Unknown> :Host (removed) :Source RPM Packages dbus-1.4.10-4.fc17.x86_64 :Target RPM Packages :Policy RPM selinux-policy-3.10.0-95.fc17.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Enforcing :Host Name (removed) :Platform Linux (removed) : 3.3.0-0.rc6.git0.2.fc17.x86_64 #1 SMP Mon Mar 5 : 16:54:07 UTC 2012 x86_64 x86_64 :Alert Count 1 :First Seen 2012-03-07T21:37:43 CET :Last Seen 2012-03-07T21:37:43 CET :Local ID 0a3e5d02-71d8-4bcc-b807-2359c6d73680 : :Raw Audit Messages :type=AVC msg=audit(1331152663.731:1313): avc: denied { connectto } for pid=30490 comm="dbus-daemon-lau" path="/var/lib/sss/pipes/nss" scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=unix_stream_socket : : :type=SYSCALL msg=audit(1331152663.731:1313): arch=x86_64 syscall=connect success=no exit=EACCES a0=3 a1=7ffffbb64e40 a2=6e a3=7ffffbb64b00 items=0 ppid=30489 pid=30490 auid=4294967295 uid=81 gid=81 euid=0 suid=0 fsuid=0 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm=dbus-daemon-lau exe=/usr/lib64/dbus-1/dbus-daemon-launch-helper subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) : :Hash: dbus-daemon-lau,system_dbusd_t,unconfined_t,unix_stream_socket,connectto : :audit2allowunable to open /sys/fs/selinux/policy: Permission denied : : :audit2allow -Runable to open /sys/fs/selinux/policy: Permission denied : :
This tells us you started sssd by hand ... I mean without using the sssd unit file. So what happened: unconfined_t @ sssd_exec_t -> sssd running as unconfined_t $ systemctl restart sssd.service
I'm working on sssd. Any ideas on how would i start it manually, while respecting selinux restrictions?
Start it with the service script. If you want to run it from a debugger, you could connect to the running daemon, or put the machine in permissive mode and ignore the AVC's
If you need to start it with "-d" option there is a way and you can use runcon.
$ runcon -u system_u -r system_r -t initrc_t -- runcon -t sssd_t -- /sbin/sssd -d LEVEL
Thanks!
*** Bug 963533 has been marked as a duplicate of this bug. ***