Hide Forgot
SELinux is preventing /usr/lib64/xulrunner-2/plugin-container from 'write' accesses on the sock_file /var/lib/sss/pipes/nss. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that plugin-container should be allowed write access on the nss sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep plugin-containe /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c 0.c1023 Target Context system_u:object_r:sssd_var_lib_t:s0 Target Objects /var/lib/sss/pipes/nss [ sock_file ] Source plugin-containe Source Path /usr/lib64/xulrunner-2/plugin-container Port <Unknown> Host (removed) Source RPM Packages xulrunner-2.0-0.21.b11.fc15 Target RPM Packages Policy RPM selinux-policy-3.9.14-2.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 2.6.38-0.rc4.git0.2.fc15.x86_64 #1 SMP Tue Feb 8 04:08:32 UTC 2011 x86_64 x86_64 Alert Count 3 First Seen Tue 15 Feb 2011 11:41:33 AM EST Last Seen Tue 15 Feb 2011 01:46:23 PM EST Local ID cf0a56f3-4f0c-4ca9-90c6-48f158712d12 Raw Audit Messages type=AVC msg=audit(1297795583.499:445): avc: denied { write } for pid=13754 comm="plugin-containe" name="nss" dev=dm-3 ino=388376 scontext=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sssd_var_lib_t:s0 tclass=sock_file type=AVC msg=audit(1297795583.499:445): avc: denied { connectto } for pid=13754 comm="plugin-containe" path="/var/lib/sss/pipes/nss" scontext=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 tcontext=system_u:system_r:sssd_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1297795583.499:445): arch=x86_64 syscall=connect success=yes exit=0 a0=e a1=7fff565a6180 a2=6e a3=7fff565a5e60 items=0 ppid=13517 pid=13754 auid=3633 uid=3633 gid=3633 euid=3633 suid=3633 fsuid=3633 egid=3633 sgid=3633 fsgid=3633 tty=(none) ses=7 comm=plugin-containe exe=/usr/lib64/xulrunner-2/plugin-container subj=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 key=(null) Hash: plugin-containe,mozilla_plugin_t,sssd_var_lib_t,sock_file,write audit2allow #============= mozilla_plugin_t ============== allow mozilla_plugin_t sssd_t:unix_stream_socket connectto; allow mozilla_plugin_t sssd_var_lib_t:sock_file write; audit2allow -R #============= mozilla_plugin_t ============== allow mozilla_plugin_t sssd_t:unix_stream_socket connectto; allow mozilla_plugin_t sssd_var_lib_t:sock_file write;
*** Bug 678014 has been marked as a duplicate of this bug. ***
Fixed in the next rawhide release.
(In reply to comment #2) > Fixed in the next rawhide release. Hi Miroslav! Does this include F15 as well?
Hi James, yes, it should be there.