Note: This is a beta release of Red Hat Bugzilla 5.0. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Also email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback here.
Bug 173067 - (selinux) avahi daemon service startup failure
Summary: (selinux) avahi daemon service startup failure
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy-targeted
Version: rawhide
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact:
Depends On:
Blocks: FC5Target
TreeView+ depends on / blocked
Reported: 2005-11-13 15:20 UTC by Nicolas Mailhot
Modified: 2007-11-30 22:11 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2005-11-14 17:25:25 UTC

Attachments (Terms of Use)

Description Nicolas Mailhot 2005-11-13 15:20:14 UTC
Description of problem:

The default targeted policy blocks the avahi daemon service

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
 # /etc/init.d/avahi-daemon start
Actual results:

Nov 13 16:18:25 rousalka avahi-daemon[3827]: Found user 'avahi' (UID 70) and
group 'avahi' (GID 70).
Nov 13 16:18:25 rousalka avahi-daemon[3827]: Successfully dropped root privileges.
Nov 13 16:18:25 rousalka avahi-daemon[3827]: avahi-daemon 0.5.2 starting up.
Nov 13 16:18:25 rousalka avahi-daemon[3827]: bind(): Permission denied

type=AVC msg=audit(1131895125.515:343): avc:  denied  { setattr } for  pid=3835
comm="avahi-daemon" name="avahi-daemon" dev=dm-0 ino=2654210
scontext=root:system_r:avahi_t:s0 tcontext=system_u:object_r:var_run_t:s0 tclass=dir
type=SYSCALL msg=audit(1131895125.515:343): arch=c000003e syscall=92 success=no
exit=-13 a0=40f28d a1=46 a2=46 a3=517270 items=1 pid=3835 auid=500 uid=0 gid=0
euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 comm="avahi-daemon"
type=CWD msg=audit(1131895125.515:343):  cwd="/"
type=PATH msg=audit(1131895125.515:343): item=0 name="/var/run/avahi-daemon/"
flags=1  inode=2654210 dev=fd:00 mode=040755 ouid=70 ogid=70 rdev=00:00
type=AVC msg=audit(1131895125.519:344): avc:  denied  { create } for  pid=3835
comm="avahi-daemon" name="socket" scontext=root:system_r:avahi_t:s0
tcontext=root:object_r:var_run_t:s0 tclass=sock_file
type=SYSCALL msg=audit(1131895125.519:344): arch=c000003e syscall=49 success=no
exit=-13 a0=9 a1=7ffffffb20d0 a2=6e a3=1a items=1 pid=3835 auid=500 uid=70
gid=70 euid=70 suid=70 fsuid=70 egid=70 sgid=70 fsgid=70 comm="avahi-daemon"
type=SOCKADDR msg=audit(1131895125.519:344):
type=PATH msg=audit(1131895125.519:344): item=0 flags=10  inode=2654210
dev=fd:00 mode=040755 ouid=70 ogid=70 rdev=00:00

Comment 1 Daniel Walsh 2005-11-14 17:25:25 UTC
This is a labeling problem.

restorecon -R -v /var/run 

Should clean it up.  If it happens again, please reopen this bug.

Note You need to log in before you can comment on or make changes to this bug.