Additional info: libreport version: 2.0.16 kernel: 3.6.2-4.fc17.x86_64 description: :SELinux is preventing /usr/lib64/xulrunner/plugin-container from read, write access on the file coolkeypk11sE-Gate 0 0-1000. : :***** Plugin catchall_labels (83.8 confidence) suggests ******************** : :If you want to allow plugin-container to have read write access on the coolkeypk11sE-Gate 0 0-1000 file :Then you need to change the label on coolkeypk11sE-Gate.0.0-1000 :Do :# semanage fcontext -a -t FILE_TYPE 'coolkeypk11sE-Gate.0.0-1000' :where FILE_TYPE is one of the following: user_tmpfs_t, user_cron_spool_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t, pulseaudio_home_t, gnome_home_type, home_cert_t, mozilla_home_t, mplayer_home_t, mozilla_plugin_tmp_t, afs_cache_t, tmpfs_t, user_fonts_cache_t, user_tmp_t. :Then execute: :restorecon -v 'coolkeypk11sE-Gate.0.0-1000' : : :***** Plugin catchall (17.1 confidence) suggests *************************** : :If you believe that plugin-container should be allowed read write access on the coolkeypk11sE-Gate 0 0-1000 file by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep plugin-containe /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c : 0.c1023 :Target Context unconfined_u:object_r:var_t:s0 :Target Objects coolkeypk11sE-Gate 0 0-1000 [ file ] :Source plugin-containe :Source Path /usr/lib64/xulrunner/plugin-container :Port <Unknown> :Host (removed) :Source RPM Packages xulrunner-16.0.1-2.fc17.x86_64 :Target RPM Packages :Policy RPM selinux-policy-3.10.0-156.fc17.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Enforcing :Host Name (removed) :Platform Linux (removed) 3.6.2-4.fc17.x86_64 #1 SMP Wed Oct : 17 02:43:21 UTC 2012 x86_64 x86_64 :Alert Count 1 :First Seen 2012-10-28 14:48:30 EDT :Last Seen 2012-10-28 14:48:30 EDT :Local ID f1bf4e11-9fb1-4418-b728-c7f728640085 : :Raw Audit Messages :type=AVC msg=audit(1351450110.814:92): avc: denied { read write } for pid=2647 comm="plugin-containe" name=636F6F6C6B6579706B313173452D47617465203020302D31303030 dev="dm-2" ino=3146139 scontext=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=file : : :type=SYSCALL msg=audit(1351450110.814:92): arch=x86_64 syscall=open success=no exit=EACCES a0=7f80b96f9200 a1=20002 a2=180 a3=7fff41fdda10 items=0 ppid=2597 pid=2647 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=2 comm=plugin-containe exe=/usr/lib64/xulrunner/plugin-container subj=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 key=(null) : :Hash: plugin-containe,mozilla_plugin_t,var_t,file,read,write : :audit2allow : :#============= mozilla_plugin_t ============== :#!!!! This avc is allowed in the current policy : :allow mozilla_plugin_t var_t:file { read write }; : :audit2allow -R : :#============= mozilla_plugin_t ============== :#!!!! This avc is allowed in the current policy : :allow mozilla_plugin_t var_t:file { read write }; :
Created attachment 634648 [details] File: type
Created attachment 634649 [details] File: hashmarkername
*** This bug has been marked as a duplicate of bug 870839 ***