Bug 870839
| Summary: | SELinux is preventing /usr/lib64/xulrunner/plugin-container from 'open' accesses on the file /var/cache/coolkey/coolkeypk11sE-Gate 0 0-1000. | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | travis mallet <travis.mallet> | ||||||
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> | ||||||
| Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||||
| Severity: | unspecified | Docs Contact: | |||||||
| Priority: | unspecified | ||||||||
| Version: | 17 | CC: | dominick.grift, dwalsh, mgrepl | ||||||
| Target Milestone: | --- | ||||||||
| Target Release: | --- | ||||||||
| Hardware: | x86_64 | ||||||||
| OS: | Unspecified | ||||||||
| Whiteboard: | abrt_hash:b96647f4a4f3f88d5faef9a99c84858d06a5af44c01a98832116f1681100114a | ||||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||||
| Doc Text: | Story Points: | --- | |||||||
| Clone Of: | Environment: | ||||||||
| Last Closed: | 2012-10-31 10:54:18 UTC | Type: | --- | ||||||
| Regression: | --- | Mount Type: | --- | ||||||
| Documentation: | --- | CRM: | |||||||
| Verified Versions: | Category: | --- | |||||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||||
| Embargoed: | |||||||||
| Attachments: |
|
||||||||
|
Description
travis mallet
2012-10-28 23:18:58 UTC
Created attachment 634787 [details]
File: type
Created attachment 634788 [details]
File: hashmarkername
*** Bug 870865 has been marked as a duplicate of this bug. *** *** Bug 870793 has been marked as a duplicate of this bug. *** Could you attach AVC msgs which you are getting? (In reply to comment #5) > Could you attach AVC msgs which you are getting? SELinux is preventing /usr/lib64/xulrunner/plugin-container from 'read, write' accesses on the file coolkeypk11sE-Gate 0 0-1000. ***** Plugin catchall_labels (83.8 confidence) suggests ******************** If you want to allow plugin-container to have read write access on the coolkeypk11sE-Gate 0 0-1000 file Then you need to change the label on coolkeypk11sE-Gate.0.0-1000 Do # semanage fcontext -a -t FILE_TYPE 'coolkeypk11sE-Gate.0.0-1000' where FILE_TYPE is one of the following: user_tmpfs_t, user_cron_spool_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t, pulseaudio_home_t, gnome_home_type, home_cert_t, mozilla_home_t, mplayer_home_t, mozilla_plugin_tmp_t, afs_cache_t, tmpfs_t, user_fonts_cache_t, user_tmp_t. Then execute: restorecon -v 'coolkeypk11sE-Gate.0.0-1000' ***** Plugin catchall (17.1 confidence) suggests *************************** If you believe that plugin-container should be allowed read write access on the coolkeypk11sE-Gate 0 0-1000 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep plugin-containe /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Sorry took so long to get back to you. Here is the info you requested. SELinux is preventing /usr/lib64/xulrunner/plugin-container from 'read, write' accesses on the file coolkeypk11sE-Gate 0 0-1000.
***** Plugin catchall_labels (83.8 confidence) suggests ********************
If you want to allow plugin-container to have read write access on the coolkeypk11sE-Gate 0 0-1000 file
Then you need to change the label on coolkeypk11sE-Gate.0.0-1000
Do
# semanage fcontext -a -t FILE_TYPE 'coolkeypk11sE-Gate.0.0-1000'
where FILE_TYPE is one of the following: user_tmpfs_t, user_cron_spool_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t, pulseaudio_home_t, gnome_home_type, home_cert_t, mozilla_home_t, mplayer_home_t, mozilla_plugin_tmp_t, afs_cache_t, tmpfs_t, user_fonts_cache_t, user_tmp_t.
Then execute:
restorecon -v 'coolkeypk11sE-Gate.0.0-1000'
***** Plugin catchall (17.1 confidence) suggests ***************************
If you believe that plugin-container should be allowed read write access on the coolkeypk11sE-Gate 0 0-1000 file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep plugin-containe /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c
0.c1023
Target Context unconfined_u:object_r:var_t:s0
Target Objects coolkeypk11sE-Gate 0 0-1000 [ file ]
Source plugin-containe
Source Path /usr/lib64/xulrunner/plugin-container
Port <Unknown>
Host trax
Source RPM Packages xulrunner-16.0.1-2.fc17.x86_64
Target RPM Packages
Policy RPM selinux-policy-3.10.0-156.fc17.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name trax
Platform Linux trax 3.6.3-1.fc17.x86_64 #1 SMP Mon Oct 22
15:32:35 UTC 2012 x86_64 x86_64
Alert Count 1
First Seen 2012-10-30 17:35:12 EDT
Last Seen 2012-10-30 17:35:12 EDT
Local ID 8ec80863-fbb7-42aa-a193-77fb4632db74
Raw Audit Messages
type=AVC msg=audit(1351632912.523:129): avc: denied { read write } for pid=11783 comm="plugin-containe" name=636F6F6C6B6579706B313173452D47617465203020302D31303030 dev="dm-2" ino=3146139 scontext=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=file
type=SYSCALL msg=audit(1351632912.523:129): arch=x86_64 syscall=open success=no exit=EACCES a0=7f2358ff1240 a1=20002 a2=180 a3=7fffc9791f40 items=0 ppid=11734 pid=11783 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=2 comm=plugin-containe exe=/usr/lib64/xulrunner/plugin-container subj=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 key=(null)
Hash: plugin-containe,mozilla_plugin_t,var_t,file,read,write
audit2allow
#============= mozilla_plugin_t ==============
allow mozilla_plugin_t var_t:file { read write };
audit2allow -R
#============= mozilla_plugin_t ==============
allow mozilla_plugin_t var_t:file { read write };
SELinux is preventing /usr/lib64/xulrunner/plugin-container from 'read, write' accesses on the file coolkeypk11sSCM Microsystems Inc. SCR 3310 [CCID Interface] 00 00-1000.
***** Plugin catchall_labels (83.8 confidence) suggests ********************
If you want to allow plugin-container to have read write access on the coolkeypk11sSCM Microsystems Inc. SCR 3310 [CCID Interface] 00 00-1000 file
Then you need to change the label on coolkeypk11sSCM.Microsystems.Inc..SCR.3310.[CCID.Interface].00.00-1000
Do
# semanage fcontext -a -t FILE_TYPE 'coolkeypk11sSCM.Microsystems.Inc..SCR.3310.[CCID.Interface].00.00-1000'
where FILE_TYPE is one of the following: user_tmpfs_t, user_cron_spool_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t, pulseaudio_home_t, gnome_home_type, home_cert_t, mozilla_home_t, mplayer_home_t, mozilla_plugin_tmp_t, afs_cache_t, tmpfs_t, user_fonts_cache_t, user_tmp_t.
Then execute:
restorecon -v 'coolkeypk11sSCM.Microsystems.Inc..SCR.3310.[CCID.Interface].00.00-1000'
***** Plugin catchall (17.1 confidence) suggests ***************************
If you believe that plugin-container should be allowed read write access on the coolkeypk11sSCM Microsystems Inc. SCR 3310 [CCID Interface] 00 00-1000 file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep plugin-containe /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c
0.c1023
Target Context unconfined_u:object_r:var_t:s0
Target Objects coolkeypk11sSCM Microsystems Inc. SCR 3310 [CCID
Interface] 00 00-1000 [ file ]
Source plugin-containe
Source Path /usr/lib64/xulrunner/plugin-container
Port <Unknown>
Host trax
Source RPM Packages xulrunner-16.0.1-2.fc17.x86_64
Target RPM Packages
Policy RPM selinux-policy-3.10.0-156.fc17.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name trax
Platform Linux trax 3.6.3-1.fc17.x86_64 #1 SMP Mon Oct 22
15:32:35 UTC 2012 x86_64 x86_64
Alert Count 1
First Seen 2012-10-30 22:13:16 EDT
Last Seen 2012-10-30 22:13:16 EDT
Local ID 35ed19d0-bc7c-43ea-9cc6-ebf8aa6ecccf
Raw Audit Messages
type=AVC msg=audit(1351649596.94:80): avc: denied { read write } for pid=2302 comm="plugin-containe" name=636F6F6C6B6579706B31317353434D204D6963726F73797374656D7320496E632E205343522033333130205B4343494420496E746572666163655D2030302030302D31303030 dev="dm-2" ino=3147916 scontext=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=file
type=SYSCALL msg=audit(1351649596.94:80): arch=x86_64 syscall=open success=no exit=EACCES a0=7f0b79047a90 a1=20002 a2=180 a3=7fffe9873700 items=0 ppid=2240 pid=2302 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=2 comm=plugin-containe exe=/usr/lib64/xulrunner/plugin-container subj=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 key=(null)
Hash: plugin-containe,mozilla_plugin_t,var_t,file,read,write
audit2allow
#============= mozilla_plugin_t ==============
allow mozilla_plugin_t var_t:file { read write };
audit2allow -R
#============= mozilla_plugin_t ==============
allow mozilla_plugin_t var_t:file { read write };
Any chance your /var directory is mislabled? restorecon -R -v /var Actually that is exactly the problem. /var/cache/coolkey |