Hide Forgot
SELinux is preventing /usr/lib64/nspluginwrapper/plugin-config from read, execute access on the file /usr/lib64/mozilla/plugins-wrapped/nswrapper_64_64.liblightsparkplugin.so. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that plugin-config should be allowed read execute access on the nswrapper_64_64.liblightsparkplugin.so file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep plugin-config /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:unconfined_r:sandbox_web_client_t:s0: c887,c1012 Target Context unconfined_u:object_r:nsplugin_rw_t:s0:c197,c496 Target Objects /usr/lib64/mozilla/plugins- wrapped/nswrapper_64_64.liblightsparkplugin.so [ file ] Source plugin-config Source Path /usr/lib64/nspluginwrapper/plugin-config Port <Unknown> Host (removed) Source RPM Packages nspluginwrapper-1.3.0-15.fc14 Target RPM Packages Policy RPM selinux-policy-3.9.7-40.fc14 Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 2.6.38.2-14.fc15.x86_64 #1 SMP Mon Apr 11 23:50:28 UTC 2011 x86_64 x86_64 Alert Count 1 First Seen Tue 26 Apr 2011 03:56:17 PM IST Last Seen Tue 26 Apr 2011 03:56:17 PM IST Local ID 7516359d-a21e-431f-9e14-148bf6cf6e55 Raw Audit Messages type=AVC msg=audit(1303813577.849:25658): avc: denied { read execute } for pid=28355 comm="plugin-config" name="nswrapper_64_64.liblightsparkplugin.so" dev=dm-3 ino=4325893 scontext=unconfined_u:unconfined_r:sandbox_web_client_t:s0:c887,c1012 tcontext=unconfined_u:object_r:nsplugin_rw_t:s0:c197,c496 tclass=file type=SYSCALL msg=audit(1303813577.849:25658): arch=x86_64 syscall=access success=yes exit=0 a0=7fff935bbd0c a1=5 a2=0 a3=34cf797210 items=0 ppid=28353 pid=28355 auid=500 uid=500 gid=501 euid=0 suid=0 fsuid=0 egid=501 sgid=501 fsgid=501 tty=(none) ses=1 comm=plugin-config exe=/usr/lib64/nspluginwrapper/plugin-config subj=unconfined_u:unconfined_r:sandbox_web_client_t:s0:c887,c1012 key=(null) Hash: plugin-config,sandbox_web_client_t,nsplugin_rw_t,file,read,execute audit2allow #============= sandbox_web_client_t ============== #!!!! This avc is a constraint violation. You will need to add an attribute to either the source or target type to make it work. #Contraint rule: allow sandbox_web_client_t nsplugin_rw_t:file { read execute }; audit2allow -R #============= sandbox_web_client_t ============== #!!!! This avc is a constraint violation. You will need to add an attribute to either the source or target type to make it work. #Contraint rule: allow sandbox_web_client_t nsplugin_rw_t:file { read execute };
Miroslav we allow this in F15 policy,