Summary:
SELinux is preventing /opt/google/chrome/chrome "setsched" access .
Detailed Description:
[chrome has a permissive type (chrome_sandbox_t). This access was not denied.]
SELinux denied access requested by chrome. It is not expected that this access
is required by chrome and this access may signal an intrusion attempt. It is
also possible that the specific version or configuration of the application is
causing it to require additional access.
Allowing Access:
You can generate a local policy module to allow this access - see FAQ
(http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug
report.
Additional Information:
Source Context unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c
0.c1023
Target Context unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c
0.c1023
Target Objects None [ process ]
Source chrome
Source Path /opt/google/chrome/chrome
Port <Unknown>
Host (removed)
Source RPM Packages google-chrome-stable-14.0.835.202-103287
Target RPM Packages
Policy RPM selinux-policy-3.6.32-127.fc12
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Plugin Name catchall
Host Name (removed)
Platform Linux (removed) 2.6.32.26-175.fc12.i686 #1
SMP Wed Dec 1 21:52:04 UTC 2010 i686 i686
Alert Count 2
First Seen Sun 09 Oct 2011 03:09:15 PM PDT
Last Seen Mon 10 Oct 2011 02:14:45 AM PDT
Local ID e05fa326-8014-44c6-960f-75fe06f09c86
Line Numbers
Raw Audit Messages
node=(removed) type=AVC msg=audit(1318238085.419:22): avc: denied { setsched } for pid=2180 comm="chrome" scontext=unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c0.c1023 tclass=process
node=(removed) type=SYSCALL msg=audit(1318238085.419:22): arch=40000003 syscall=156 success=yes exit=0 a0=3 a1=0 a2=bf849d18 a3=b44ff780 items=0 ppid=1 pid=2180 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=1 comm="chrome" exe="/opt/google/chrome/chrome" subj=unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c0.c1023 key=(null)
Hash String generated from catchall,chrome,chrome_sandbox_t,chrome_sandbox_t,process,setsched
audit2allow suggests:
#============= chrome_sandbox_t ==============
allow chrome_sandbox_t self:process setsched;