Bug 485921
Summary: | SELinux is preventing access to files with the label, file_t. | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Richard Opalka <ropalka> |
Component: | nspluginwrapper | Assignee: | Martin Stransky <stransky> |
Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | medium | Docs Contact: | |
Priority: | low | ||
Version: | rawhide | CC: | caillon, dwalsh, mcepl, stransky, wtogami |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2009-02-17 15:17:42 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Richard Opalka
2009-02-17 14:09:02 UTC
[/home/opalka][/home/opalka]>ls -lZ /usr/lib64/nspluginwrapper/ drwxr-xr-x root root system_u:object_r:lib_t:s0 . drwxr-xr-x root root system_u:object_r:lib_t:s0 .. -rwxr-xr-x root root system_u:object_r:lib_t:s0 libnoxshm.so -rwxr-xr-x root root system_u:object_r:lib_t:s0 libxpcom.so -rwxr-xr-x root root system_u:object_r:bin_t:s0 npconfig -rwxr-xr-x root root system_u:object_r:lib_t:s0 npplayer -rwxr-xr-x root root system_u:object_r:bin_t:s0 npviewer -rwxr-xr-x root root system_u:object_r:nsplugin_exec_t:s0 npviewer.bin -rwxr-xr-x root root system_u:object_r:lib_t:s0 npviewer.sh -rwxr-xr-x root root system_u:object_r:lib_t:s0 npwrapper.so -rwxr-xr-x root root system_u:object_r:lib_t:s0 nspluginplayer -rwsr-xr-x root root system_u:object_r:nsplugin_config_exec_t:s0 plugin-config [/home/opalka][/home/opalka]> Richard is my colleague next table, and I have checked that his computer that it looks like it is setting all right. After rather large change to the partitions etc. (encrypting /home) we had to do 'touch /.autorelabel;reboot' anyway, all files in /usr/lib*/nspluginwrapper seems to be labelled correctly, and yet this AVC denials happens whenever he opens new URL. I would bet there is a file in /tmp labeled file_t. find / -context "*:file_t:*" OK, you are partially right -- it wasn't in /tmp, but it was misconfiguration -- /home and /home/lost+found were unlablled. |