| Summary: | Hald doesn't starts: dbus_bus_request_name(): Connection ":1.6" is not allowed to own the service "org.freedesktop.Hal" due to security policies in the configuration file | ||
|---|---|---|---|
| Product: | hal | Reporter: | Alexander <dkf.rack> |
| Component: | hald | Assignee: | David Zeuthen (not reading bugmail) <zeuthen> |
| Status: | NEW --- | QA Contact: | |
| Severity: | normal | ||
| Priority: | medium | ||
| Version: | unspecified | ||
| Hardware: | x86 (IA32) | ||
| OS: | Linux (All) | ||
| Whiteboard: | |||
| i915 platform: | i915 features: | ||
Use of freedesktop.org services, including Bugzilla, is subject to our Code of Conduct. How we collect and use information is described in our Privacy Policy.
I'm a Mandriva 2008 user, trying to install hal (0.5.11) from git. Since I've installed new D-Bus (1.1.20), hald doesn't runs on startup, but D-bus does. Simply D-Bus doesn't allowes connection to "org.freedesktop.Hal". When i run "hald --daemon=no --verbose=yes": <skipped...> 20:36:45.450 [D] hotplug.c:443: event held back: /sys/block/sda/sda5 20:36:45.450 [I] hotplug.c:429: checking event /sys/block/sda/sda6 20:36:45.450 [D] hotplug.c:399: event /sys/block/sda/sda6 dependant on /sys/block/sda 20:36:45.450 [D] hotplug.c:443: event held back: /sys/block/sda/sda6 20:36:45.450 [I] hotplug.c:429: checking event /sys/block/sda/sda7 20:36:45.450 [D] hotplug.c:399: event /sys/block/sda/sda7 dependant on /sys/block/sda 20:36:45.450 [D] hotplug.c:443: event held back: /sys/block/sda/sda7 20:36:45.450 [I] hotplug.c:429: checking event /sys/block/sdb/sdb1 20:36:45.450 [D] hotplug.c:399: event /sys/block/sdb/sdb1 dependant on /sys/block/sdb 20:36:45.450 [D] hotplug.c:443: event held back: /sys/block/sdb/sdb1 20:36:45.450 [D] hotplug.c:447: events queued = 7, events in progress = 10 20:36:45.450 [I] hald.c:864: Device probing completed 20:36:45.450 [I] hald_dbus.c:5834: entering 20:28:40.999 [E] hald_dbus.c:5845: dbus_bus_request_name(): Connection ":1.3" is not allowed to own the service "org.freedesktop.Hal" due to security policies in the configuration file and then it kills itself. Googling wasn't successful, and in mailing lists I haven't seen such troubles. No.. I saw same posts, but no answers... So there are .conf files of dbus,hal, paths, and install logs of this apps. 1. d-bus system.conf: <!-- This configuration file controls the systemwide message bus. Add a system-local.conf and edit that rather than changing this file directly. --> <!-- Note that there are any number of ways you can hose yourself security-wise by screwing up this file; in particular, you probably don't want to listen on any more addresses, add any more auth mechanisms, run as a different user, etc. --> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <!-- Our well-known bus type, do not change this --> <type>system</type> <!-- Run as special user --> <user>messagebus</user> <!-- Fork into daemon mode --> <fork/> <!-- Write a pid file --> <pidfile>/var/run/messagebus.pid</pidfile> <!-- Only allow socket-credentials-based authentication --> <auth>EXTERNAL</auth> <!-- Only listen on a local socket. (abstract=/path/to/socket means use abstract namespace, don't really create filesystem file; only Linux supports this. Use path=/whatever on other systems.) --> <listen>unix:path=/var/run/dbus/system_bus_socket</listen> <policy context="default"> <!-- Deny everything then punch holes --> <deny send_interface="*"/> <deny receive_interface="*"/> <deny own="*"/> <!-- But allow all users to connect --> <allow user="*"/> <!-- Allow anyone to talk to the message bus --> <!-- FIXME I think currently these allow rules are always implicit even if they aren't in here --> <allow send_destination="org.freedesktop.DBus"/> <allow receive_sender="org.freedesktop.DBus"/> <!-- valid replies are always allowed --> <allow send_requested_reply="true"/> <allow receive_requested_reply="true"/> </policy> <!-- Config files are placed here that among other things, punch holes in the above policy for specific services. --> <includedir>system.d</includedir> <!-- This is included last so local configuration can override what's in this standard file --> <include ignore_missing="yes">system-local.conf</include> <include if_selinux_enabled="yes" selinux_root_relative="yes">contexts/dbus_contexts</include> </busconfig> 2. hal.conf: !DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <!-- This configuration file specifies the required security policies for the HAL to work. --> <!-- Only root or user haldaemon can own the HAL service --> <policy user="haldaemon"> <allow own="org.freedesktop.Hal"/> </policy> <policy user="root"> <allow own="org.freedesktop.Hal"/> </policy> <!-- Allow anyone to invoke methods on the Manager and Device interfaces --> <policy context="default"> <allow send_interface="org.freedesktop.Hal.Manager"/> <allow send_interface="org.freedesktop.Hal.Device"/> <allow receive_interface="org.freedesktop.Hal.Manager" receive_sender="org.freedesktop.Hal"/> <allow receive_interface="org.freedesktop.Hal.Device" receive_sender="org.freedesktop.Hal"/> <allow send_interface="org.freedesktop.Hal.Device.SystemPowerManagement"/> <allow send_interface="org.freedesktop.Hal.Device.LaptopPanel"/> <allow send_interface="org.freedesktop.Hal.Device.Volume"/> <allow send_interface="org.freedesktop.Hal.Device.Volume.Crypto"/> <allow receive_interface="org.freedesktop.Hal.Device.SystemPowerManagement" receive_sender="org.freedesktop.Hal"/> <allow receive_interface="org.freedesktop.Hal.Device.LaptopPanel" receive_sender="org.freedesktop.Hal"/> <allow receive_interface="org.freedesktop.Hal.Device.Volume" receive_sender="org.freedesktop.Hal"/> <allow receive_interface="org.freedesktop.Hal.Device.Volume.Crypto" receive_sender="org.freedesktop.Hal"/> </policy> <!-- Default policy for the exported interfaces; if PolicyKit is not used for access control you will need to modify this --> <policy context="default"> <allow send_interface="org.freedesktop.Hal.Device.SystemPowerManagement"/> <allow send_interface="org.freedesktop.Hal.Device.VideoAdapterPM"/> <allow send_interface="org.freedesktop.Hal.Device.LaptopPanel"/> <allow send_interface="org.freedesktop.Hal.Device.Volume"/> <allow send_interface="org.freedesktop.Hal.Device.Volume.Crypto"/> </policy> </busconfig> 3.configuration of hal: HAL 0.5.11 ============== prefix: / libdir: /usr/lib libexecdir: /usr/libexec bindir: /usr/bin sbindir: /usr/sbin datadir: ${datarootdir} sysconfdir: /etc localstatedir: /var docdir: ${datarootdir}/doc/${PACKAGE_TARNAME} dbus-1 system.d dir: /etc/dbus-1/system.d pci.ids dir: /usr/share usb.ids dir: /usr/share compiler: gcc cflags: -g -O2 -Wall -Wchar-subscripts -Wmissing-declarations -Wnested-externs -Wpointer-arith -Wcast-align -Wsign-compare ldflags: -Wl,--as-needed cppflags: xmlto: no xmllint: /usr/bin/xmllint User for HAL: haldaemon Group for HAL: haldaemon hald pidfile: /var/run/haldaemon.pid hald socket dir: /var/run/hald eject program: /usr/bin/eject OS backend: linux use acpi kernel interface: yes use acpid interface: yes use libusb: no use libpci: no use libparted: no use gperf: no use PolicyKit: yes use ConsoleKit: yes use ACL management: no use umount.hal helper: no use ACPI: yes use PMU: yes use APM: yes use Sony PIC: yes Macbook backlight support: no (Linux only, x86 only, requires libpci) Macbook Pro utils: no (Linux only, x86 only, requires libpci) iMac backlight support: yes (Linux only, x86) OMAP utils: no (Linux only, arm only) CPU frequency scaling: yes (Linux only) Re-map multimedia keys: no (Linux only, requires gperf) Forward IBM ACPI events: no (Linux only) Forward Toshiba ACPI events: no (Linux only) USB wireless mouse power: no (Linux only, requires libusb) Dell Backlight: no (Linux only, requires libsmbios >= 0.13.4) Support deprecated(removed) keys: no (via a FDI-file) Maintainer mode: no Building verbose mode: no Building api docs: yes Building docs: no Building man pages: yes 4. configuring of d-bus: D-Bus 1.1.20 ============== prefix: /usr exec_prefix: ${prefix} libdir: /usr/lib libexecdir: /usr/libexec bindir: /usr/bin sysconfdir: /etc localstatedir: /var datadir: /usr/share source code location: . compiler: gcc cflags: -g -O2 -Wall -Wchar-subscripts -Wmissing-declarations -Wmissing-prototypes -Wnested-externs -Wpointer-arith -Wcast-align -Wsign-compare -Wdeclaration-after-statement -fno-common cppflags: cxxflags: -g -O2 64-bit int: long long 32-bit int: int 16-bit int: short Doxygen: no xmlto: no Maintainer mode: no gcc coverage profiling: no Building unit tests: no Building verbose mode: no Building assertions: no Building checks: yes Building SELinux support: no Building inotify support: yes Building dnotify support: no Building kqueue support: no Building X11 code: yes Building Doxygen docs: no Building XML docs: no Building cache support: yes Gettext libs (empty OK): Using XML parser: expat Init scripts style: redhat Abstract socket names: yes System bus socket: /var/run/dbus/system_bus_socket System bus address: unix:path=/var/run/dbus/system_bus_socket System bus PID file: /var/run/messagebus.pid Session bus socket dir: /home/libertine/tmp Console auth dir: /var/run/console/ Console owner file: no Console owner file path: System bus user: messagebus Session bus services dir: /usr/share/dbus-1/services 'make check' socket dir: /home/libertine/tmp Let me know if I missed any information, please. And if you find me a fool, please, let me know cause I'm solving this troble with hald for a few weeks... ))(( Anyone, help me, PLZ...