-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Antonio Olivares wrote:
Dear fellow selinux experts,
Net avc for npviewer :(
Summary:
SELinux is preventing npviewer.bin (nsplugin_t) "read" to
./pulse-shm-4180703699
(tmpfs_t).
Detailed Description:
SELinux denied access requested by npviewer.bin. It is not expected that this
access is required by npviewer.bin and this access may signal an intrusion
attempt. It is also possible that the specific version or configuration of the
application is causing it to require additional access.
Allowing Access:
Sometimes labeling problems can cause SELinux denials. You could try to restore
the default system file context for ./pulse-shm-4180703699,
restorecon -v './pulse-shm-4180703699'
If this does not work, there is currently no automatic way to allow this access.
Instead, you can generate a local policy module to allow this access - see FAQ
(
http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (
http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.
Additional Information:
Source Context unconfined_u:unconfined_r:nsplugin_t:s0-s0:c0.c102
3
Target Context unconfined_u:object_r:tmpfs_t:s0
Target Objects ./pulse-shm-4180703699 [ file ]
Source npviewer.bin
Source Path /usr/lib/nspluginwrapper/npviewer.bin
Port <Unknown>
Host riohigh
Source RPM Packages nspluginwrapper-1.1.4-1.fc11
Target RPM Packages
Policy RPM selinux-policy-3.5.13-18.fc10
Selinux Enabled True
Policy Type targeted
MLS Enabled True
Enforcing Mode Enforcing
Plugin Name catchall_file
Host Name riohigh
Platform Linux riohigh 2.6.27.5-117.fc10.i686 #1 SMP Tue
Nov 18 12:19:59 EST 2008 i686 athlon
Alert Count 1
First Seen Tue 02 Dec 2008 06:57:09 AM CST
Last Seen Tue 02 Dec 2008 06:57:09 AM CST
Local ID c049e765-9d3b-4384-927a-19797fb78d8d
Line Numbers
Raw Audit Messages
node=riohigh type=AVC msg=audit(1228222629.565:217): avc: denied { read } for pid=4625
comm="npviewer.bin" name="pulse-shm-4180703699" dev=tmpfs ino=36988
scontext=unconfined_u:unconfined_r:nsplugin_t:s0-s0:c0.c1023
tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file
node=riohigh type=SYSCALL msg=audit(1228222629.565:217): arch=40000003 syscall=5
success=no exit=-13 a0=bfda08d0 a1=a0000 a2=0 a3=bfda08d0 items=0 ppid=4427 pid=4625
auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500
tty=(none) ses=13 comm="npviewer.bin"
exe="/usr/lib/nspluginwrapper/npviewer.bin"
subj=unconfined_u:unconfined_r:nsplugin_t:s0-s0:c0.c1023 key=(null)
I try the fix and i get:
[olivares@riohigh ~]$ su -
Password:
[root@riohigh ~]# restorecon -v './pulse-shm-4180703699'
restorecon: stat error on ./pulse-shm-4180703699: No such file or directory
[root@riohigh ~]#
Thanks,
Antonio
--
fedora-selinux-list mailing list
fedora-selinux-list(a)redhat.com
https://www.redhat.com/mailman/listinfo/fedora-selinux-list This one has me
baffled, on how you created this file. This file should
be labeled user_tmpfs_t in which case nsplugin would have been allowed
to use it, But for some reason it got created with the incorrect context.
Could you try to upgrade to the latest policy and see if this still happens.
I tried an experiment as the unconfined user
# mount -t tmpfs_t /dev/shm /mnt
# ls -ldZ /mnt/redhat/
drwxrwxrwt root root staff_u:object_r:tmpfs_t:s0 /mnt/redhat/
# touch /mnt/redhat/test
# ls -lZ /mnt/redhat/test
- -rw-r--r-- root root staff_u:object_r:user_tmpfs_t:s0 /mnt/redhat/test
Which is what pulseaudio should have done.
Could you check what context pulseaudio is running with
# ps -eZ | grep pulse
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora -
http://enigmail.mozdev.org
iEYEARECAAYFAkk1pdkACgkQrlYvE4MpobNjawCg6EmpLWaQNOK9ndoYgD8GN4TV
HG8AoNJIqutO0vFPPa1tjRW+gLk2V9WU
=L/DR
-----END PGP SIGNATURE-----