Re: cups-pdf and selinux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Daniel,

Find attached the message. Thanks in advance.

henri

On Wed, Nov 11, 2009 at 12:41 PM, Daniel J Walsh <dwalsh@xxxxxxxxxx> wrote:
> On 11/11/2009 09:08 AM, Henrique Koesjan wrote:
>> Does anyone knows how to make cups-pdf works with selinux? I've tried
>> "#setsebool -P cupsd_disable_trans 1" but it does not seem work.
>>
>> Sumário
>> SELinux is preventing gs (cups_pdf_t) "search" to / (mount_tmp_t).
>>
>> Descrição detalhada
>> SELinux denied access requested by gs. / may be a mislabeled. /
>> default SELinux type is root_t, but its current type is mount_tmp_t.
>> Changing this file back to the default type, may fix your problem.
>>
>> henri
>>
> Could you attach the complete setroubleshoot message.
>
> --
> fedora-list mailing list
> fedora-list@xxxxxxxxxx
> To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
> Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines
>
Sumário:

SELinux is preventing nm-system-setti (NetworkManager_t) "getattr" to /var/tmp
(mount_tmp_t).

Descrição detalhada:

SELinux denied access requested by nm-system-setti. /var/tmp may be a
mislabeled. /var/tmp default SELinux type is tmp_t, but its current type is
mount_tmp_t. Changing this file back to the default type, may fix your problem.

File contexts can be assigned to a file in the following ways.

  * Files created in a directory receive the file context of the parent
    directory by default.
  * The SELinux policy might override the default label inherited from the
    parent directory by specifying a process running in context A which creates
    a file in a directory labeled B will instead create the file with label C.
    An example of this would be the dhcp client running with the dhclient_t type
    and creates a file in the directory /etc. This file would normally receive
    the etc_t type due to parental inheritance but instead the file is labeled
    with the net_conf_t type because the SELinux policy specifies this.
  * Users can change the file context on a file using tools such as chcon, or
    restorecon.

This file could have been mislabeled either by user error, or if an normally
confined application was run under the wrong domain.

However, this might also indicate a bug in SELinux because the file should not
have been labeled with this type.

If you believe this is a bug, please file a bug report
(http://bugzilla.redhat.com/bugzilla/enter_bug.cgi) against this package.

Permitindo acesso:

You can restore the default system context to this file by executing the
restorecon command. restorecon '/var/tmp', if this file is a directory, you can
recursively restore using restorecon -R '/var/tmp'.

Reparar comando:

restorecon '/var/tmp'

Informação adicional:

Contexto fonte                system_u:system_r:NetworkManager_t:s0-s0:c0.c1023
Contexto alvo                 system_u:object_r:mount_tmp_t:s0
Objetos do alvo               /var/tmp [ dir ]
Fonte                         nm-system-setti
Caminho da fonte              /usr/sbin/nm-system-settings
Porta                         <Desconhecido>
Máquina                      henrique.desktop
Pacotes do RPM fonte          NetworkManager-0.7.1-8.git20090708.fc11
Pacotes do RPM alvo           filesystem-2.4.21-1.fc11
RPM da política              selinux-policy-3.6.12-86.fc11
Selinux habilitado            True
Tipo de política             targeted
MLS habilitado                True
Modo reforçado               Enforcing
Nome do plugin                restorecon
Nome da máquina              henrique.desktop
Plataforma                    Linux henrique.desktop 2.6.30.9-96.fc11.i586 #1
                              SMP Tue Nov 3 23:33:04 EST 2009 i686 athlon
Contador de alertas           60
Visto primeiro em             Qua 23 Set 2009 10:01:09 BRT
Visto pela última vez em     Qui 12 Nov 2009 09:47:48 BRST
ID local                      0ef2cc38-c656-4f48-bb73-ee57f960fe22
Números de linha             

Mensagens de auditoria não p 

node=henrique.desktop type=AVC msg=audit(1258026468.236:7): avc:  denied  { getattr } for  pid=1343 comm="nm-system-setti" path="/var/tmp" dev=tmpfs ino=7082 scontext=system_u:system_r:NetworkManager_t:s0-s0:c0.c1023 tcontext=system_u:object_r:mount_tmp_t:s0 tclass=dir

node=henrique.desktop type=SYSCALL msg=audit(1258026468.236:7): arch=40000003 syscall=195 success=no exit=-13 a0=2e743c a1=bf81fdec a2=85bff4 a3=3 items=0 ppid=1 pid=1343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="nm-system-setti" exe="/usr/sbin/nm-system-settings" subj=system_u:system_r:NetworkManager_t:s0-s0:c0.c1023 key=(null)


-- 
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux