Hide Forgot
Summary: SELinux is preventing /opt/google/chrome/chrome from loading /opt/google/chrome/chrome which requires text relocation. Detailed Description: The chrome application attempted to load /opt/google/chrome/chrome which requires text relocation. This is a potential security problem. Most libraries do not need this permission. Libraries are sometimes coded incorrectly and request this permission. The SELinux Memory Protection Tests (http://people.redhat.com/drepper/selinux-mem.html) web page explains how to remove this requirement. You can configure SELinux temporarily to allow /opt/google/chrome/chrome to use relocation as a workaround, until the library is fixed. Please file a bug report. Allowing Access: If you trust /opt/google/chrome/chrome to run correctly, you can change the file context to textrel_shlib_t. "chcon -t textrel_shlib_t '/opt/google/chrome/chrome'" You must also change the default file context files on the system in order to preserve them even on a full relabel. "semanage fcontext -a -t textrel_shlib_t '/opt/google/chrome/chrome'" Fix Command: chcon -t textrel_shlib_t '/opt/google/chrome/chrome' Additional Information: Source Context unconfined_u:unconfined_r:unconfined_execmem_t:s0- s0:c0.c1023 Target Context system_u:object_r:execmem_exec_t:s0 Target Objects /opt/google/chrome/chrome [ file ] Source chrome Source Path /opt/google/chrome/chrome Port <Unknown> Host (removed) Source RPM Packages google-chrome-unstable-14.0.803.0-90483 Target RPM Packages google-chrome-unstable-14.0.803.0-90483 Policy RPM selinux-policy-3.6.32-127.fc12 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Plugin Name allow_execmod Host Name (removed) Platform Linux paul 2.6.32.26-175.fc12.x86_64 #1 SMP Wed Dec 1 21:39:34 UTC 2010 x86_64 x86_64 Alert Count 1 First Seen Mon 27 Jun 2011 10:08:03 PM EDT Last Seen Mon 27 Jun 2011 10:08:03 PM EDT Local ID d7a9a7cc-a553-469a-bd3a-bbae6868f843 Line Numbers Raw Audit Messages node=paul type=AVC msg=audit(1309226883.173:239): avc: denied { execmod } for pid=25090 comm="chrome" path="/opt/google/chrome/chrome" dev=dm-3 ino=41 scontext=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 tcontext=system_u:object_r:execmem_exec_t:s0 tclass=file node=paul type=SYSCALL msg=audit(1309226883.173:239): arch=c000003e syscall=10 success=no exit=-13 a0=7f4b8c87a000 a1=368e000 a2=5 a3=7f4b8cd8d2c8 items=0 ppid=1 pid=25090 auid=501 uid=501 gid=501 euid=501 suid=501 fsuid=501 egid=501 sgid=501 fsgid=501 tty=(none) ses=1 comm="chrome" exe="/opt/google/chrome/chrome" subj=unconfined_u:unconfined_r:unconfined_execmem_t:s0-s0:c0.c1023 key=(null) Hash String generated from allow_execmod,chrome,unconfined_execmem_t,execmem_exec_t,file,execmod audit2allow suggests: #============= unconfined_execmem_t ============== #!!!! This avc can be allowed using the boolean 'allow_execmod' allow unconfined_execmem_t execmem_exec_t:file execmod;
F12 is no longer supported. Please update to newer Fedora release.