Additional info: libreport version: 2.0.16 kernel: 3.6.3-1.fc17.x86_64
Created attachment 634787 [details] File: type
Created attachment 634788 [details] File: hashmarkername
*** Bug 870865 has been marked as a duplicate of this bug. ***
*** Bug 870793 has been marked as a duplicate of this bug. ***
Could you attach AVC msgs which you are getting?
(In reply to comment #5) > Could you attach AVC msgs which you are getting? SELinux is preventing /usr/lib64/xulrunner/plugin-container from 'read, write' accesses on the file coolkeypk11sE-Gate 0 0-1000. ***** Plugin catchall_labels (83.8 confidence) suggests ******************** If you want to allow plugin-container to have read write access on the coolkeypk11sE-Gate 0 0-1000 file Then you need to change the label on coolkeypk11sE-Gate.0.0-1000 Do # semanage fcontext -a -t FILE_TYPE 'coolkeypk11sE-Gate.0.0-1000' where FILE_TYPE is one of the following: user_tmpfs_t, user_cron_spool_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t, pulseaudio_home_t, gnome_home_type, home_cert_t, mozilla_home_t, mplayer_home_t, mozilla_plugin_tmp_t, afs_cache_t, tmpfs_t, user_fonts_cache_t, user_tmp_t. Then execute: restorecon -v 'coolkeypk11sE-Gate.0.0-1000' ***** Plugin catchall (17.1 confidence) suggests *************************** If you believe that plugin-container should be allowed read write access on the coolkeypk11sE-Gate 0 0-1000 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep plugin-containe /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Sorry took so long to get back to you. Here is the info you requested.
SELinux is preventing /usr/lib64/xulrunner/plugin-container from 'read, write' accesses on the file coolkeypk11sE-Gate 0 0-1000. ***** Plugin catchall_labels (83.8 confidence) suggests ******************** If you want to allow plugin-container to have read write access on the coolkeypk11sE-Gate 0 0-1000 file Then you need to change the label on coolkeypk11sE-Gate.0.0-1000 Do # semanage fcontext -a -t FILE_TYPE 'coolkeypk11sE-Gate.0.0-1000' where FILE_TYPE is one of the following: user_tmpfs_t, user_cron_spool_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t, pulseaudio_home_t, gnome_home_type, home_cert_t, mozilla_home_t, mplayer_home_t, mozilla_plugin_tmp_t, afs_cache_t, tmpfs_t, user_fonts_cache_t, user_tmp_t. Then execute: restorecon -v 'coolkeypk11sE-Gate.0.0-1000' ***** Plugin catchall (17.1 confidence) suggests *************************** If you believe that plugin-container should be allowed read write access on the coolkeypk11sE-Gate 0 0-1000 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep plugin-containe /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c 0.c1023 Target Context unconfined_u:object_r:var_t:s0 Target Objects coolkeypk11sE-Gate 0 0-1000 [ file ] Source plugin-containe Source Path /usr/lib64/xulrunner/plugin-container Port <Unknown> Host trax Source RPM Packages xulrunner-16.0.1-2.fc17.x86_64 Target RPM Packages Policy RPM selinux-policy-3.10.0-156.fc17.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name trax Platform Linux trax 3.6.3-1.fc17.x86_64 #1 SMP Mon Oct 22 15:32:35 UTC 2012 x86_64 x86_64 Alert Count 1 First Seen 2012-10-30 17:35:12 EDT Last Seen 2012-10-30 17:35:12 EDT Local ID 8ec80863-fbb7-42aa-a193-77fb4632db74 Raw Audit Messages type=AVC msg=audit(1351632912.523:129): avc: denied { read write } for pid=11783 comm="plugin-containe" name=636F6F6C6B6579706B313173452D47617465203020302D31303030 dev="dm-2" ino=3146139 scontext=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1351632912.523:129): arch=x86_64 syscall=open success=no exit=EACCES a0=7f2358ff1240 a1=20002 a2=180 a3=7fffc9791f40 items=0 ppid=11734 pid=11783 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=2 comm=plugin-containe exe=/usr/lib64/xulrunner/plugin-container subj=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 key=(null) Hash: plugin-containe,mozilla_plugin_t,var_t,file,read,write audit2allow #============= mozilla_plugin_t ============== allow mozilla_plugin_t var_t:file { read write }; audit2allow -R #============= mozilla_plugin_t ============== allow mozilla_plugin_t var_t:file { read write };
SELinux is preventing /usr/lib64/xulrunner/plugin-container from 'read, write' accesses on the file coolkeypk11sSCM Microsystems Inc. SCR 3310 [CCID Interface] 00 00-1000. ***** Plugin catchall_labels (83.8 confidence) suggests ******************** If you want to allow plugin-container to have read write access on the coolkeypk11sSCM Microsystems Inc. SCR 3310 [CCID Interface] 00 00-1000 file Then you need to change the label on coolkeypk11sSCM.Microsystems.Inc..SCR.3310.[CCID.Interface].00.00-1000 Do # semanage fcontext -a -t FILE_TYPE 'coolkeypk11sSCM.Microsystems.Inc..SCR.3310.[CCID.Interface].00.00-1000' where FILE_TYPE is one of the following: user_tmpfs_t, user_cron_spool_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t, pulseaudio_home_t, gnome_home_type, home_cert_t, mozilla_home_t, mplayer_home_t, mozilla_plugin_tmp_t, afs_cache_t, tmpfs_t, user_fonts_cache_t, user_tmp_t. Then execute: restorecon -v 'coolkeypk11sSCM.Microsystems.Inc..SCR.3310.[CCID.Interface].00.00-1000' ***** Plugin catchall (17.1 confidence) suggests *************************** If you believe that plugin-container should be allowed read write access on the coolkeypk11sSCM Microsystems Inc. SCR 3310 [CCID Interface] 00 00-1000 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep plugin-containe /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c 0.c1023 Target Context unconfined_u:object_r:var_t:s0 Target Objects coolkeypk11sSCM Microsystems Inc. SCR 3310 [CCID Interface] 00 00-1000 [ file ] Source plugin-containe Source Path /usr/lib64/xulrunner/plugin-container Port <Unknown> Host trax Source RPM Packages xulrunner-16.0.1-2.fc17.x86_64 Target RPM Packages Policy RPM selinux-policy-3.10.0-156.fc17.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name trax Platform Linux trax 3.6.3-1.fc17.x86_64 #1 SMP Mon Oct 22 15:32:35 UTC 2012 x86_64 x86_64 Alert Count 1 First Seen 2012-10-30 22:13:16 EDT Last Seen 2012-10-30 22:13:16 EDT Local ID 35ed19d0-bc7c-43ea-9cc6-ebf8aa6ecccf Raw Audit Messages type=AVC msg=audit(1351649596.94:80): avc: denied { read write } for pid=2302 comm="plugin-containe" name=636F6F6C6B6579706B31317353434D204D6963726F73797374656D7320496E632E205343522033333130205B4343494420496E746572666163655D2030302030302D31303030 dev="dm-2" ino=3147916 scontext=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_t:s0 tclass=file type=SYSCALL msg=audit(1351649596.94:80): arch=x86_64 syscall=open success=no exit=EACCES a0=7f0b79047a90 a1=20002 a2=180 a3=7fffe9873700 items=0 ppid=2240 pid=2302 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 tty=(none) ses=2 comm=plugin-containe exe=/usr/lib64/xulrunner/plugin-container subj=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 key=(null) Hash: plugin-containe,mozilla_plugin_t,var_t,file,read,write audit2allow #============= mozilla_plugin_t ============== allow mozilla_plugin_t var_t:file { read write }; audit2allow -R #============= mozilla_plugin_t ============== allow mozilla_plugin_t var_t:file { read write };
Any chance your /var directory is mislabled? restorecon -R -v /var
Actually that is exactly the problem. /var/cache/coolkey