Hide Forgot
libreport version: 2.0.6 executable: /usr/bin/python hashmarkername: setroubleshoot kernel: 3.1.0-0.rc6.git0.3.fc16.i686 reason: SELinux is preventing /usr/libexec/colord from read, search access on the dossier /. time: Sun Oct 9 19:14:04 2011 description: :SELinux is preventing /usr/libexec/colord from read, search access on the dossier /. : :***** Plugin file (36.8 confidence) suggests ******************************* : :If you think this is caused by a badly mislabeled machine. :Then you need to fully relabel. :Do :touch /.autorelabel; reboot : :***** Plugin file (36.8 confidence) suggests ******************************* : :If you think this is caused by a badly mislabeled machine. :Then you need to fully relabel. :Do :touch /.autorelabel; reboot : :***** Plugin catchall_labels (23.2 confidence) suggests ******************** : :If vous souhaitez autoriser colord à accéder à read search sur directory :Then you need to change the label on / :Do :# semanage fcontext -a -t FILE_TYPE '/' :where FILE_TYPE is one of the following: colord_tmp_t, textrel_shlib_t, colord_t, cert_t, mnt_t, noxattrfs, tmp_t, usr_t, device_t, locale_t, etc_t, proc_t, sysfs_t, tmpfs_t, user_tmpfs_t, var_run_t, sysctl_dev_t, colord_tmpfs_t, var_lib_t, icc_data_home_t, sysctl_crypto_t, proc_net_t, net_conf_t, colord_var_lib_t, abrt_t, lib_t, root_t, dbusd_etc_t, udev_var_run_t, usr_t, device_t, etc_t. :Then execute: :restorecon -v '/' : : :***** Plugin catchall (5.04 confidence) suggests *************************** : :If you believe that colord should be allowed read search access on the directory by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep colord /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context system_u:system_r:colord_t:s0-s0:c0.c1023 :Target Context system_u:object_r:file_t:s0 :Target Objects / [ dir ] :Source colord :Source Path /usr/libexec/colord :Port <Inconnu> :Host (removed) :Source RPM Packages colord-0.1.13-1.fc16 :Target RPM Packages filesystem-2.4.44-1.fc16 :Policy RPM selinux-policy-3.10.0-32.fc16 :Selinux Enabled True :Policy Type targeted :Enforcing Mode Enforcing :Host Name (removed) :Platform Linux SunPC.home 3.1.0-0.rc6.git0.3.fc16.i686 #1 : SMP Fri Sep 16 12:22:19 UTC 2011 i686 i686 :Alert Count 4 :First Seen dim. 09 oct. 2011 04:59:07 CEST :Last Seen dim. 09 oct. 2011 04:59:07 CEST :Local ID dd324838-5662-4bb2-899f-057a277187e3 : :Raw Audit Messages :type=AVC msg=audit(1318129147.840:674): avc: denied { read search } for pid=1115 comm="colord" name="/" dev=sdb9 ino=2 scontext=system_u:system_r:colord_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=dir : : :type=SYSCALL msg=audit(1318129147.840:674): arch=i386 syscall=access success=no exit=EACCES a0=9d41210 a1=5 a2=4cbd2ff4 a3=1 items=0 ppid=1 pid=1115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=colord exe=/usr/libexec/colord subj=system_u:system_r:colord_t:s0-s0:c0.c1023 key=(null) : :Hash: colord,colord_t,file_t,dir,read,search : :audit2allow : :#============= colord_t ============== :allow colord_t file_t:dir { read search }; : :audit2allow -R : :#============= colord_t ============== :allow colord_t file_t:dir { read search }; :
*** This bug has been marked as a duplicate of bug 704827 ***
*** This bug has been marked as a duplicate of bug 744616 ***
*** Bug 877982 has been marked as a duplicate of this bug. ***