Bug 870839 - SELinux is preventing /usr/lib64/xulrunner/plugin-container from 'open' accesses on the file /var/cache/coolkey/coolkeypk11sE-Gate 0 0-1000.
Summary: SELinux is preventing /usr/lib64/xulrunner/plugin-container from 'open' acces...
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: 17
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Miroslav Grepl
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:b96647f4a4f3f88d5faef9a99c8...
: 870793 870865 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-10-28 23:18 UTC by travis mallet
Modified: 2012-10-31 10:54 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2012-10-31 10:54:18 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
File: type (9 bytes, text/plain)
2012-10-28 23:19 UTC, travis mallet
no flags Details
File: hashmarkername (14 bytes, text/plain)
2012-10-28 23:19 UTC, travis mallet
no flags Details

Description travis mallet 2012-10-28 23:18:58 UTC
Additional info:
libreport version: 2.0.16
kernel:         3.6.3-1.fc17.x86_64

Comment 1 travis mallet 2012-10-28 23:19:00 UTC
Created attachment 634787 [details]
File: type

Comment 2 travis mallet 2012-10-28 23:19:02 UTC
Created attachment 634788 [details]
File: hashmarkername

Comment 3 Miroslav Grepl 2012-10-29 09:43:15 UTC
*** Bug 870865 has been marked as a duplicate of this bug. ***

Comment 4 Miroslav Grepl 2012-10-29 11:44:56 UTC
*** Bug 870793 has been marked as a duplicate of this bug. ***

Comment 5 Miroslav Grepl 2012-10-29 13:21:44 UTC
Could you attach AVC msgs which you are getting?

Comment 6 travis mallet 2012-10-30 20:23:59 UTC
(In reply to comment #5)
> Could you attach AVC msgs which you are getting?

SELinux is preventing /usr/lib64/xulrunner/plugin-container from 'read, write' accesses on the file coolkeypk11sE-Gate 0 0-1000.

*****  Plugin catchall_labels (83.8 confidence) suggests  ********************

If you want to allow plugin-container to have read write access on the coolkeypk11sE-Gate 0 0-1000 file
Then you need to change the label on coolkeypk11sE-Gate.0.0-1000
Do
# semanage fcontext -a -t FILE_TYPE 'coolkeypk11sE-Gate.0.0-1000'
where FILE_TYPE is one of the following: user_tmpfs_t, user_cron_spool_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t, pulseaudio_home_t, gnome_home_type, home_cert_t, mozilla_home_t, mplayer_home_t, mozilla_plugin_tmp_t, afs_cache_t, tmpfs_t, user_fonts_cache_t, user_tmp_t. 
Then execute: 
restorecon -v 'coolkeypk11sE-Gate.0.0-1000'


*****  Plugin catchall (17.1 confidence) suggests  ***************************

If you believe that plugin-container should be allowed read write access on the coolkeypk11sE-Gate 0 0-1000 file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep plugin-containe /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Sorry took so long to get back to you. Here is the info you requested.

Comment 7 travis mallet 2012-10-30 21:38:32 UTC
SELinux is preventing /usr/lib64/xulrunner/plugin-container from 'read, write' accesses on the file coolkeypk11sE-Gate 0 0-1000.

*****  Plugin catchall_labels (83.8 confidence) suggests  ********************

If you want to allow plugin-container to have read write access on the coolkeypk11sE-Gate 0 0-1000 file
Then you need to change the label on coolkeypk11sE-Gate.0.0-1000
Do
# semanage fcontext -a -t FILE_TYPE 'coolkeypk11sE-Gate.0.0-1000'
where FILE_TYPE is one of the following: user_tmpfs_t, user_cron_spool_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t, pulseaudio_home_t, gnome_home_type, home_cert_t, mozilla_home_t, mplayer_home_t, mozilla_plugin_tmp_t, afs_cache_t, tmpfs_t, user_fonts_cache_t, user_tmp_t. 
Then execute: 
restorecon -v 'coolkeypk11sE-Gate.0.0-1000'


*****  Plugin catchall (17.1 confidence) suggests  ***************************

If you believe that plugin-container should be allowed read write access on the coolkeypk11sE-Gate 0 0-1000 file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep plugin-containe /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c
                              0.c1023
Target Context                unconfined_u:object_r:var_t:s0
Target Objects                coolkeypk11sE-Gate 0 0-1000 [ file ]
Source                        plugin-containe
Source Path                   /usr/lib64/xulrunner/plugin-container
Port                          <Unknown>
Host                          trax
Source RPM Packages           xulrunner-16.0.1-2.fc17.x86_64
Target RPM Packages           
Policy RPM                    selinux-policy-3.10.0-156.fc17.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     trax
Platform                      Linux trax 3.6.3-1.fc17.x86_64 #1 SMP Mon Oct 22
                              15:32:35 UTC 2012 x86_64 x86_64
Alert Count                   1
First Seen                    2012-10-30 17:35:12 EDT
Last Seen                     2012-10-30 17:35:12 EDT
Local ID                      8ec80863-fbb7-42aa-a193-77fb4632db74

Raw Audit Messages
type=AVC msg=audit(1351632912.523:129): avc:  denied  { read write } for  pid=11783 comm="plugin-containe" name=636F6F6C6B6579706B313173452D47617465203020302D31303030 dev="dm-2" ino=3146139 scontext=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=file


type=SYSCALL msg=audit(1351632912.523:129): arch=x86_64 syscall=open success=no exit=EACCES a0=7f2358ff1240 a1=20002 a2=180 a3=7fffc9791f40 items=0 ppid=11734 pid=11783 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=2 comm=plugin-containe exe=/usr/lib64/xulrunner/plugin-container subj=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 key=(null)

Hash: plugin-containe,mozilla_plugin_t,var_t,file,read,write

audit2allow

#============= mozilla_plugin_t ==============
allow mozilla_plugin_t var_t:file { read write };

audit2allow -R

#============= mozilla_plugin_t ==============
allow mozilla_plugin_t var_t:file { read write };

Comment 8 travis mallet 2012-10-31 03:35:32 UTC
SELinux is preventing /usr/lib64/xulrunner/plugin-container from 'read, write' accesses on the file coolkeypk11sSCM Microsystems Inc. SCR 3310 [CCID Interface] 00 00-1000.

*****  Plugin catchall_labels (83.8 confidence) suggests  ********************

If you want to allow plugin-container to have read write access on the coolkeypk11sSCM Microsystems Inc. SCR 3310 [CCID Interface] 00 00-1000 file
Then you need to change the label on coolkeypk11sSCM.Microsystems.Inc..SCR.3310.[CCID.Interface].00.00-1000
Do
# semanage fcontext -a -t FILE_TYPE 'coolkeypk11sSCM.Microsystems.Inc..SCR.3310.[CCID.Interface].00.00-1000'
where FILE_TYPE is one of the following: user_tmpfs_t, user_cron_spool_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t, pulseaudio_home_t, gnome_home_type, home_cert_t, mozilla_home_t, mplayer_home_t, mozilla_plugin_tmp_t, afs_cache_t, tmpfs_t, user_fonts_cache_t, user_tmp_t. 
Then execute: 
restorecon -v 'coolkeypk11sSCM.Microsystems.Inc..SCR.3310.[CCID.Interface].00.00-1000'


*****  Plugin catchall (17.1 confidence) suggests  ***************************

If you believe that plugin-container should be allowed read write access on the coolkeypk11sSCM Microsystems Inc. SCR 3310 [CCID Interface] 00 00-1000 file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep plugin-containe /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c
                              0.c1023
Target Context                unconfined_u:object_r:var_t:s0
Target Objects                coolkeypk11sSCM Microsystems Inc. SCR 3310 [CCID
                              Interface] 00 00-1000 [ file ]
Source                        plugin-containe
Source Path                   /usr/lib64/xulrunner/plugin-container
Port                          <Unknown>
Host                          trax
Source RPM Packages           xulrunner-16.0.1-2.fc17.x86_64
Target RPM Packages           
Policy RPM                    selinux-policy-3.10.0-156.fc17.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     trax
Platform                      Linux trax 3.6.3-1.fc17.x86_64 #1 SMP Mon Oct 22
                              15:32:35 UTC 2012 x86_64 x86_64
Alert Count                   1
First Seen                    2012-10-30 22:13:16 EDT
Last Seen                     2012-10-30 22:13:16 EDT
Local ID                      35ed19d0-bc7c-43ea-9cc6-ebf8aa6ecccf

Raw Audit Messages
type=AVC msg=audit(1351649596.94:80): avc:  denied  { read write } for  pid=2302 comm="plugin-containe" name=636F6F6C6B6579706B31317353434D204D6963726F73797374656D7320496E632E205343522033333130205B4343494420496E746572666163655D2030302030302D31303030 dev="dm-2" ino=3147916 scontext=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=file


type=SYSCALL msg=audit(1351649596.94:80): arch=x86_64 syscall=open success=no exit=EACCES a0=7f0b79047a90 a1=20002 a2=180 a3=7fffe9873700 items=0 ppid=2240 pid=2302 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=2 comm=plugin-containe exe=/usr/lib64/xulrunner/plugin-container subj=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 key=(null)

Hash: plugin-containe,mozilla_plugin_t,var_t,file,read,write

audit2allow

#============= mozilla_plugin_t ==============
allow mozilla_plugin_t var_t:file { read write };

audit2allow -R

#============= mozilla_plugin_t ==============
allow mozilla_plugin_t var_t:file { read write };

Comment 9 Daniel Walsh 2012-10-31 10:49:15 UTC
Any chance your /var directory is mislabled?

restorecon -R -v /var

Comment 10 Daniel Walsh 2012-10-31 10:54:18 UTC
Actually that is exactly the problem.

/var/cache/coolkey


Note You need to log in before you can comment on or make changes to this bug.