| Summary: | SELinux is preventing /opt/google/chrome/chrome from 'execmod' accesses on the archivo /opt/google/chrome/libffmpegsumo.so. | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Alejandro <Alex.bleue> |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 16 | CC: | dominick.grift, dwalsh, mgrepl |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | i686 | ||
| OS: | Unspecified | ||
| Whiteboard: | abrt_hash:2fcb4744f0aec29ccdddfdecf16a52031bb8ab4f1f21fe548b8ab4a736f941aa | ||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-10-17 07:05:21 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
Could you use chromium from http://fedoraproject.org/wiki/Chromium In other case you will need to add a label for /opt/google/chrome/libffmpegsumo.so chcon -t textrel_shlib_t '/opt/google/chrome/libffmpegsumo.so' |
libreport version: 2.0.6 executable: /usr/bin/python hashmarkername: setroubleshoot kernel: 3.1.0-0.rc9.git0.0.fc16.i686 reason: SELinux is preventing /opt/google/chrome/chrome from 'execmod' accesses on the archivo /opt/google/chrome/libffmpegsumo.so. time: Sat Oct 15 15:06:02 2011 description: :SELinux is preventing /opt/google/chrome/chrome from 'execmod' accesses on the archivo /opt/google/chrome/libffmpegsumo.so. : :***** Plugin allow_execmod (91.4 confidence) suggests ********************** : :If desea permitir que chrome tenga execmod acceso al libffmpegsumo.so file :Then you need to change the label on '/opt/google/chrome/libffmpegsumo.so' :Do :# semanage fcontext -a -t textrel_shlib_t '/opt/google/chrome/libffmpegsumo.so' :# restorecon -v '/opt/google/chrome/libffmpegsumo.so' : :***** Plugin catchall (9.59 confidence) suggests *************************** : :If you believe that chrome should be allowed execmod access on the libffmpegsumo.so file by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep chrome /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c : 0.c1023 :Target Context system_u:object_r:bin_t:s0 :Target Objects /opt/google/chrome/libffmpegsumo.so [ file ] :Source chrome :Source Path /opt/google/chrome/chrome :Port <Desconocido> :Host (removed) :Source RPM Packages google-chrome-stable-14.0.835.202-103287 :Target RPM Packages google-chrome-stable-14.0.835.202-103287 :Policy RPM selinux-policy-3.10.0-40.fc16 :Selinux Enabled True :Policy Type targeted :Enforcing Mode Enforcing :Host Name (removed) :Platform Linux (removed) 3.1.0-0.rc9.git0.0.fc16.i686 : #1 SMP Wed Oct 5 16:15:47 UTC 2011 i686 i686 :Alert Count 4 :First Seen sáb 15 oct 2011 01:50:12 CDT :Last Seen sáb 15 oct 2011 15:02:22 CDT :Local ID dacdfd3e-84e6-4c4b-afaf-2a1fad6ea345 : :Raw Audit Messages :type=AVC msg=audit(1318708942.59:77): avc: denied { execmod } for pid=2560 comm="chrome" path="/opt/google/chrome/libffmpegsumo.so" dev=dm-1 ino=396297 scontext=unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c0.c1023 tcontext=system_u:object_r:bin_t:s0 tclass=file : : :type=SYSCALL msg=audit(1318708942.59:77): arch=i386 syscall=mprotect success=no exit=EACCES a0=1a2de000 a1=273000 a2=5 a3=bfd3ef60 items=0 ppid=0 pid=2560 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=2 comm=chrome exe=/opt/google/chrome/chrome subj=unconfined_u:unconfined_r:chrome_sandbox_t:s0-s0:c0.c1023 key=(null) : :Hash: chrome,chrome_sandbox_t,bin_t,file,execmod : :audit2allow : :#============= chrome_sandbox_t ============== :allow chrome_sandbox_t bin_t:file execmod; : :audit2allow -R : :#============= chrome_sandbox_t ============== :allow chrome_sandbox_t bin_t:file execmod; :