Description of problem: SELinux is preventing /usr/lib/xulrunner/plugin-container from 'execmod' accesses on the file /usr/java/jre1.7.0_25/lib/i386/client/libjvm.so. ***** Plugin restorecon (55.7 confidence) suggests ************************* If você deseja reparar este rótulo. /usr/java/jre1.7.0_25/lib/i386/client/libjvm.so rótulo padrão deve ser textrel_shlib_t. Then você pode executar o restorecon. Do # /sbin/restorecon -v /usr/java/jre1.7.0_25/lib/i386/client/libjvm.so ***** Plugin mozplugger (41.9 confidence) suggests ************************* If you want to use the plugin package Then you must turn off SELinux controls on the Firefox plugins. Do # setsebool unconfined_mozilla_plugin_transition 0 ***** Plugin catchall_labels (3.26 confidence) suggests ******************** If you want to allow plugin-container to have execmod access on the libjvm.so file Then você precisará mudar o rótulo em /usr/java/jre1.7.0_25/lib/i386/client/libjvm.so Do # semanage fcontext -a -t FILE_TYPE '/usr/java/jre1.7.0_25/lib/i386/client/libjvm.so' onde FILE_TYPE é um dos seguintes: alsa_home_t, audio_home_t, auth_home_t, cache_home_t, config_home_t, data_home_t, dbus_home_t, fetchmail_home_t, gconf_home_t, git_user_content_t, gkeyringd_gnome_home_t, gnome_home_t, gpg_secret_t, gstreamer_home_t, home_bin_t, home_cert_t, httpd_user_content_t, httpd_user_htaccess_t, httpd_user_ra_content_t, httpd_user_rw_content_t, httpd_user_script_exec_t, icc_data_home_t, iceauth_home_t, irc_home_t, irc_tmp_t, irssi_home_t, kismet_home_t, krb5_home_t, local_login_home_t, mail_home_rw_t, mail_home_t, mandb_home_t, mozilla_home_t, mpd_user_data_t, mplayer_home_t, mysqld_home_t, polipo_cache_home_t, polipo_config_home_t, procmail_home_t, pulseaudio_home_t, rlogind_home_t, rssh_ro_t, rssh_rw_t, screen_home_t, spamc_home_t, ssh_home_t, svirt_home_t, telepathy_cache_home_t, telepathy_data_home_t, telepathy_gabble_cache_home_t, telepathy_logger_cache_home_t, telepathy_logger_data_home_t, telepathy_mission_control_cache_home_t, telepathy_mission_control_data_home_t, telepathy_mission_control_home_t, telepathy_sunshine_home_t, textrel_shlib_t, thumb_home_t, tvtime_home_t, uml_ro_t, uml_rw_t, user_fonts_cache_t, user_fonts_config_t, user_fonts_t, user_home_t, user_tmp_t, user_tmpfs_t, virt_content_t, virt_home_t, vmware_conf_t, vmware_file_t, wine_home_t, wireshark_home_t, xauth_home_t, xdm_home_t. Então execute: restorecon -v '/usr/java/jre1.7.0_25/lib/i386/client/libjvm.so' ***** Plugin catchall (1.05 confidence) suggests *************************** If você acredita que o plugin-container deva ser permitido acesso de execmod em libjvm.so file por default. Then você precisa reportar este como um erro. Você pode gerar um módulo de política local para permitir este acesso. Do permitir este acesso agora executando: # grep plugin-containe /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c 0.c1023 Target Context unconfined_u:object_r:usr_t:s0 Target Objects /usr/java/jre1.7.0_25/lib/i386/client/libjvm.so [ file ] Source plugin-containe Source Path /usr/lib/xulrunner/plugin-container Port <Unknown> Host (removed) Source RPM Packages xulrunner-22.0-4.fc18.i686 Target RPM Packages Policy RPM selinux-policy-3.11.1-98.fc18.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.10.4-100.fc18.i686.PAE #1 SMP Thu Aug 1 21:25:13 UTC 2013 i686 i686 Alert Count 3 First Seen 2013-08-09 09:19:06 BRT Last Seen 2013-08-13 08:13:52 BRT Local ID c3a5708d-7286-453e-89ff-b0fedeac7979 Raw Audit Messages type=AVC msg=audit(1376392432.430:318): avc: denied { execmod } for pid=1703 comm="plugin-containe" path="/usr/java/jre1.7.0_25/lib/i386/client/libjvm.so" dev="sdc3" ino=281162 scontext=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:usr_t:s0 tclass=file type=SYSCALL msg=audit(1376392432.430:318): arch=i386 syscall=mprotect success=no exit=EACCES a0=b4f96000 a1=512000 a2=5 a3=b60dea80 items=0 ppid=1629 pid=1703 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000 fsuid=1000 egid=1000 sgid=1000 fsgid=1000 ses=1 tty=(none) comm=plugin-containe exe=/usr/lib/xulrunner/plugin-container subj=unconfined_u:unconfined_r:mozilla_plugin_t:s0-s0:c0.c1023 key=(null) Hash: plugin-containe,mozilla_plugin_t,usr_t,file,execmod audit2allow #============= mozilla_plugin_t ============== allow mozilla_plugin_t usr_t:file execmod; audit2allow -R require { type usr_t; type mozilla_plugin_t; class file execmod; } #============= mozilla_plugin_t ============== allow mozilla_plugin_t usr_t:file execmod; Additional info: reporter: libreport-2.1.5 hashmarkername: setroubleshoot kernel: 3.10.4-100.fc18.i686.PAE type: libreport
The alert told you what to do. ***** Plugin restorecon (55.7 confidence) suggests ************************* If você deseja reparar este rótulo. /usr/java/jre1.7.0_25/lib/i386/client/libjvm.so rótulo padrão deve ser textrel_shlib_t. Then você pode executar o restorecon. Do # /sbin/restorecon -v /usr/java/jre1.7.0_25/lib/i386/client/libjvm.so