libreport version: 2.0.8 executable: /usr/bin/python hashmarkername: setroubleshoot kernel: 3.3.0-0.rc7.git0.3.fc17.x86_64 reason: SELinux is preventing chrome from using the 'ptrace' accesses on a process. time: Fri 16 Mar 2012 04:10:31 PM EDT description: :SELinux is preventing chrome from using the 'ptrace' accesses on a process. : :***** Plugin catchall_boolean (89.3 confidence) suggests ******************* : :If you want to allow sysadm to debug or ptrace all processes. :Then you must tell SELinux about this by enabling the 'deny_ptrace'boolean. :Do :setsebool -P deny_ptrace 0 : :***** Plugin catchall (11.6 confidence) suggests *************************** : :If you believe that chrome should be allowed ptrace access on processes labeled unconfined_t by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep chrome /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1 : 023 :Target Context unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1 : 023 :Target Objects [ process ] :Source chrome :Source Path chrome :Port <Unknown> :Host (removed) :Source RPM Packages :Target RPM Packages :Policy RPM selinux-policy-3.10.0-95.fc17.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Enforcing :Host Name (removed) :Platform Linux (removed) 3.3.0-0.rc7.git0.3.fc17.x86_64 #1 SMP : Mon Mar 12 18:40:17 UTC 2012 x86_64 x86_64 :Alert Count 7 :First Seen Fri 16 Mar 2012 03:56:43 PM EDT :Last Seen Fri 16 Mar 2012 04:04:20 PM EDT :Local ID 7ad421f7-1fdc-4587-9e22-c18f07075ccc : :Raw Audit Messages :type=AVC msg=audit(1331928260.584:124): avc: denied { ptrace } for pid=4052 comm="chrome" scontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process : : :Hash: chrome,unconfined_t,unconfined_t,process,ptrace : :audit2allowunable to open /sys/fs/selinux/policy: Permission denied : : :audit2allow -Runable to open /sys/fs/selinux/policy: Permission denied : :
This is a kernel issue that we hope to resolve soon. allowing processes to ptrace their children.
This bug would probably be fixed by the fix for this bug. https://bugzilla.redhat.com/show_bug.cgi?id=802072
*** Bug 805465 has been marked as a duplicate of this bug. ***
*** Bug 806509 has been marked as a duplicate of this bug. ***
*** Bug 809660 has been marked as a duplicate of this bug. ***
*** Bug 809455 has been marked as a duplicate of this bug. ***
*** Bug 810339 has been marked as a duplicate of this bug. ***
*** This bug has been marked as a duplicate of bug 801858 ***