SELinux is preventing npviewer.bin (nsplugin_t) "read" to ./pulse-shm-4180703699

Daniel J Walsh dwalsh at redhat.com
Tue Dec 2 21:17:13 UTC 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Antonio Olivares wrote:
> Dear fellow selinux experts,
> 
> Net avc for npviewer :(  
> 
> 
> Summary:
> 
> SELinux is preventing npviewer.bin (nsplugin_t) "read" to ./pulse-shm-4180703699
> (tmpfs_t).
> 
> Detailed Description:
> 
> SELinux denied access requested by npviewer.bin. It is not expected that this
> access is required by npviewer.bin and this access may signal an intrusion
> attempt. It is also possible that the specific version or configuration of the
> application is causing it to require additional access.
> 
> Allowing Access:
> 
> Sometimes labeling problems can cause SELinux denials. You could try to restore
> the default system file context for ./pulse-shm-4180703699,
> 
> restorecon -v './pulse-shm-4180703699'
> 
> If this does not work, there is currently no automatic way to allow this access.
> Instead, you can generate a local policy module to allow this access - see FAQ
> (http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
> SELinux protection altogether. Disabling SELinux protection is not recommended.
> Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
> against this package.
> 
> Additional Information:
> 
> Source Context                unconfined_u:unconfined_r:nsplugin_t:s0-s0:c0.c102
>                               3
> Target Context                unconfined_u:object_r:tmpfs_t:s0
> Target Objects                ./pulse-shm-4180703699 [ file ]
> Source                        npviewer.bin
> Source Path                   /usr/lib/nspluginwrapper/npviewer.bin
> Port                          <Unknown>
> Host                          riohigh
> Source RPM Packages           nspluginwrapper-1.1.4-1.fc11
> Target RPM Packages           
> Policy RPM                    selinux-policy-3.5.13-18.fc10
> Selinux Enabled               True
> Policy Type                   targeted
> MLS Enabled                   True
> Enforcing Mode                Enforcing
> Plugin Name                   catchall_file
> Host Name                     riohigh
> Platform                      Linux riohigh 2.6.27.5-117.fc10.i686 #1 SMP Tue
>                               Nov 18 12:19:59 EST 2008 i686 athlon
> Alert Count                   1
> First Seen                    Tue 02 Dec 2008 06:57:09 AM CST
> Last Seen                     Tue 02 Dec 2008 06:57:09 AM CST
> Local ID                      c049e765-9d3b-4384-927a-19797fb78d8d
> Line Numbers                  
> 
> Raw Audit Messages            
> 
> node=riohigh type=AVC msg=audit(1228222629.565:217): avc:  denied  { read } for  pid=4625 comm="npviewer.bin" name="pulse-shm-4180703699" dev=tmpfs ino=36988 scontext=unconfined_u:unconfined_r:nsplugin_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file
> 
> node=riohigh type=SYSCALL msg=audit(1228222629.565:217): arch=40000003 syscall=5 success=no exit=-13 a0=bfda08d0 a1=a0000 a2=0 a3=bfda08d0 items=0 ppid=4427 pid=4625 auid=500 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=13 comm="npviewer.bin" exe="/usr/lib/nspluginwrapper/npviewer.bin" subj=unconfined_u:unconfined_r:nsplugin_t:s0-s0:c0.c1023 key=(null)
> 
> 
> I try the fix and i get:
> 
> [olivares at riohigh ~]$ su -
> Password: 
> [root at riohigh ~]# restorecon -v './pulse-shm-4180703699'
> 
> restorecon:  stat error on ./pulse-shm-4180703699:  No such file or directory
> [root at riohigh ~]# 
> 
> Thanks,
> 
> Antonio 
> 
> 
>       
> 
> --
> fedora-selinux-list mailing list
> fedora-selinux-list at redhat.com
> https://www.redhat.com/mailman/listinfo/fedora-selinux-list
This one has me baffled, on how you created this file.  This file should
be labeled user_tmpfs_t in which case nsplugin would have been allowed
to use it,  But for some reason it got created with the incorrect context.

Could you try to upgrade to the latest policy and see if this still happens.

I tried an experiment as the unconfined user

# mount -t tmpfs_t /dev/shm /mnt
# ls -ldZ /mnt/redhat/
drwxrwxrwt  root root staff_u:object_r:tmpfs_t:s0      /mnt/redhat/
# touch /mnt/redhat/test
# ls -lZ /mnt/redhat/test
- -rw-r--r--  root root staff_u:object_r:user_tmpfs_t:s0 /mnt/redhat/test

Which is what pulseaudio should have done.


Could you check what context pulseaudio is running with

# ps -eZ | grep pulse

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org

iEYEARECAAYFAkk1pdkACgkQrlYvE4MpobNjawCg6EmpLWaQNOK9ndoYgD8GN4TV
HG8AoNJIqutO0vFPPa1tjRW+gLk2V9WU
=L/DR
-----END PGP SIGNATURE-----




More information about the fedora-selinux-list mailing list