Hide Forgot
SELinux is preventing /var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu from 'search' accesses on the directory .X11-unix. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that setiathome-5.28.x86_64-pc-linux-gnu should be allowed search access on the .X11-unix directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep setiathome-5.28 /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:boinc_project_t:s0 Target Context system_u:object_r:xdm_tmp_t:s0 Target Objects .X11-unix [ dir ] Source setiathome-5.28 Source Path /var/lib/boinc/projects/setiathome.berkeley.edu/se tiathome-5.28.x86_64-pc-linux-gnu Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.9.16-23.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 2.6.38.5-24.fc15.x86_64 #1 SMP Fri May 6 08:00:28 UTC 2011 x86_64 x86_64 Alert Count 1 First Seen Sat 14 May 2011 17:01:15 BST Last Seen Sat 14 May 2011 17:01:15 BST Local ID 02beedf8-86b6-43bc-b7f5-d8f14f607d02 Raw Audit Messages type=AVC msg=audit(1305388875.277:86): avc: denied { search } for pid=3520 comm="setiathome-5.28" name=".X11-unix" dev=dm-0 ino=137613 scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1305388875.277:86): arch=x86_64 syscall=connect success=no exit=EACCES a0=8 a1=7fffc7c00120 a2=13 a3=0 items=0 ppid=3513 pid=3520 auid=4294967295 uid=492 gid=482 euid=492 suid=492 fsuid=492 egid=482 sgid=482 fsgid=482 tty=(none) ses=4294967295 comm=setiathome-5.28 exe=/var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu subj=system_u:system_r:boinc_project_t:s0 key=(null) Hash: setiathome-5.28,boinc_project_t,xdm_tmp_t,dir,search audit2allow #============= boinc_project_t ============== allow boinc_project_t xdm_tmp_t:dir search; audit2allow -R #============= boinc_project_t ============== allow boinc_project_t xdm_tmp_t:dir search;
This occurs if I press the "view graphics" button in boinc-manager for a SETI project. Also causes the following: SELinux is preventing /var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu from create access on the tcp_socket port None. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that setiathome-5.28.x86_64-pc-linux-gnu should be allowed create access on the port None tcp_socket by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep setiathome-5.28 /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:boinc_project_t:s0 Target Context system_u:system_r:boinc_project_t:s0 Target Objects port None [ tcp_socket ] Source setiathome-5.28 Source Path /var/lib/boinc/projects/setiathome.berkeley.edu/se tiathome-5.28.x86_64-pc-linux-gnu Port <Unknown> Host Shaggy Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.9.16-23.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name Shaggy Platform Linux Shaggy 2.6.38.5-24.fc15.x86_64 #1 SMP Fri May 6 08:00:28 UTC 2011 x86_64 x86_64 Alert Count 1 First Seen Sat 14 May 2011 17:01:15 BST Last Seen Sat 14 May 2011 17:01:15 BST Local ID 9f5cfb4d-2b0f-44d7-8c4f-2e5abc1df49d Raw Audit Messages type=AVC msg=audit(1305388875.278:88): avc: denied { create } for pid=3520 comm="setiathome-5.28" scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:system_r:boinc_project_t:s0 tclass=tcp_socket type=SYSCALL msg=audit(1305388875.278:88): arch=x86_64 syscall=socket success=no exit=EACCES a0=2 a1=1 a2=0 a3=0 items=0 ppid=3513 pid=3520 auid=4294967295 uid=492 gid=482 euid=492 suid=492 fsuid=492 egid=482 sgid=482 fsgid=482 tty=(none) ses=4294967295 comm=setiathome-5.28 exe=/var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu subj=system_u:system_r:boinc_project_t:s0 key=(null) Hash: setiathome-5.28,boinc_project_t,boinc_project_t,tcp_socket,create audit2allow #============= boinc_project_t ============== allow boinc_project_t self:tcp_socket create; audit2allow -R #============= boinc_project_t ============== allow boinc_project_t self:tcp_socket create;
(In reply to comment #1) > This occurs if I press the "view graphics" button in boinc-manager for a SETI > project. > Does it work for you?
No, the graphic doesn't appear.
ok, execute # semanage permissive -a boinc_project_t and try to re-test it. Also give me output of # ausearch -m avc -ts recent
(In reply to comment #4) > ok, execute > > # semanage permissive -a boinc_project_t > > and try to re-test it. Also give me output of Another AVC appears > # ausearch -m avc -ts recent ---- time->Thu May 19 19:11:44 2011 type=SYSCALL msg=audit(1305828704.775:69): arch=c000003e syscall=42 success=yes exit=0 a0=8 a1=7fff7246d640 a2=13 a3=0 items=0 ppid=1107 pid=3006 auid=4294967295 uid=492 gid=482 euid=492 suid=492 fsuid=492 egid=482 sgid=482 fsgid=482 tty=(none) ses=4294967295 comm="setiathome-5.28" exe="/var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu" subj=system_u:system_r:boinc_project_t:s0 key=(null) type=AVC msg=audit(1305828704.775:69): avc: denied { connectto } for pid=3006 comm="setiathome-5.28" path="/tmp/.X11-unix/X0" scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:system_r:xserver_t:s0-s0:c0.c1023 tclass=unix_stream_socket type=AVC msg=audit(1305828704.775:69): avc: denied { write } for pid=3006 comm="setiathome-5.28" name="X0" dev=dm-0 ino=131694 scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1305828704.775:69): avc: denied { search } for pid=3006 comm="setiathome-5.28" name=".X11-unix" dev=dm-0 ino=137613 scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir ---- time->Thu May 19 19:14:20 2011 type=SYSCALL msg=audit(1305828860.939:70): arch=c000003e syscall=42 success=yes exit=0 a0=9 a1=7fff45b65840 a2=13 a3=0 items=0 ppid=1107 pid=3067 auid=4294967295 uid=492 gid=482 euid=492 suid=492 fsuid=492 egid=482 sgid=482 fsgid=482 tty=(none) ses=4294967295 comm="setiathome-5.28" exe="/var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu" subj=system_u:system_r:boinc_project_t:s0 key=(null) type=AVC msg=audit(1305828860.939:70): avc: denied { connectto } for pid=3067 comm="setiathome-5.28" path="/tmp/.X11-unix/X0" scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:system_r:xserver_t:s0-s0:c0.c1023 tclass=unix_stream_socket type=AVC msg=audit(1305828860.939:70): avc: denied { write } for pid=3067 comm="setiathome-5.28" name="X0" dev=dm-0 ino=131694 scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1305828860.939:70): avc: denied { search } for pid=3067 comm="setiathome-5.28" name=".X11-unix" dev=dm-0 ino=137613 scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir ---- time->Thu May 19 19:18:15 2011 type=SYSCALL msg=audit(1305829095.927:73): arch=c000003e syscall=42 success=yes exit=0 a0=8 a1=7ffff602be70 a2=13 a3=0 items=0 ppid=1107 pid=3185 auid=4294967295 uid=492 gid=482 euid=492 suid=492 fsuid=492 egid=482 sgid=482 fsgid=482 tty=(none) ses=4294967295 comm="setiathome-5.28" exe="/var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu" subj=system_u:system_r:boinc_project_t:s0 key=(null) type=AVC msg=audit(1305829095.927:73): avc: denied { connectto } for pid=3185 comm="setiathome-5.28" path="/tmp/.X11-unix/X0" scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:system_r:xserver_t:s0-s0:c0.c1023 tclass=unix_stream_socket type=AVC msg=audit(1305829095.927:73): avc: denied { write } for pid=3185 comm="setiathome-5.28" name="X0" dev=dm-0 ino=131694 scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1305829095.927:73): avc: denied { search } for pid=3185 comm="setiathome-5.28" name=".X11-unix" dev=dm-0 ino=137613 scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir This is academic really, because the graphics don't work in any case.