Rahul Sundaram wrote: > Hi, > > In rawhide, I am running across this issue: > > -- > > Summary: > > SELinux is preventing the dbus-daemon-lau (system_dbusd_t) from executing > ./system-config-services-mechanism.py. > > Detailed Description: > > SELinux has denied the dbus-daemon-lau from executing > ./system-config-services-mechanism.py. If dbus-daemon-lau is supposed to > be able > to execute ./system-config-services-mechanism.py, this could be a labeling > problem. Most confined domains are allowed to execute files labeled > bin_t. So > you could change the labeling on this file to bin_t and retry the > application. > If this dbus-daemon-lau is not supposed to execute > ./system-config-services-mechanism.py, this could signal a intrusion > attempt. > > Allowing Access: > > If you want to allow dbus-daemon-lau to execute > ./system-config-services-mechanism.py: chcon -t bin_t > './system-config-services-mechanism.py' If this fix works, please update > the > file context on disk, with the following command: semanage fcontext -a > -t bin_t > './system-config-services-mechanism.py' Please specify the full path to the > executable, Please file a bug report > (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this > selinux-policy > to make sure this becomes the default labeling. > > Additional Information: > > Source Context system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 > Target Context system_u:object_r:usr_t:s0 > Target Objects ./system-config-services-mechanism.py [ > file ] > Source dbus-daemon-lau > Source Path /lib/dbus-1/dbus-daemon-launch-helper > Port <Unknown> > Host localhost.localdomain > Source RPM Packages dbus-1.2.1-7.fc10 > Target RPM Packages > Policy RPM selinux-policy-3.5.1-4.fc10 > Selinux Enabled True > Policy Type targeted > MLS Enabled True > Enforcing Mode Enforcing > Plugin Name execute > Host Name localhost.localdomain > Platform Linux localhost.localdomain > 2.6.27-0.166.rc0.git8.fc10.i686 #1 SMP Mon > Jul 21 > 20:51:26 EDT 2008 i686 i686 > Alert Count 2 > First Seen Thu 07 Aug 2008 02:21:12 AM IST > Last Seen Thu 07 Aug 2008 04:01:06 AM IST > Local ID 8473c2be-dcfe-4f50-9db3-6f3dbd1d6025 > Line Numbers > > Raw Audit Messages > > host=localhost.localdomain type=AVC msg=audit(1218061866.291:173): avc: > denied { execute } for pid=26453 comm="dbus-daemon-lau" > name="system-config-services-mechanism.py" dev=dm-1 ino=1474565 > scontext=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 > tcontext=system_u:object_r:usr_t:s0 tclass=file > > host=localhost.localdomain type=SYSCALL msg=audit(1218061866.291:173): > arch=40000003 syscall=11 success=no exit=-13 a0=8816018 a1=8815d60 > a2=8815008 a3=6c99bc items=0 ppid=26452 pid=26453 auid=4294967295 uid=0 > gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) > ses=4294967295 comm="dbus-daemon-lau" > exe="/lib/dbus-1/dbus-daemon-launch-helper" > subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 key=(null) > > --- > > Rahul > > > -- > fedora-selinux-list mailing list > fedora-selinux-list@xxxxxxxxxx > https://www.redhat.com/mailman/listinfo/fedora-selinux-list Fixed in selinux-policy-3.5.2-2.fc10 Should be in tonights rawhide. -- fedora-selinux-list mailing list fedora-selinux-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-selinux-list