-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 06/07/2011 09:46 AM, Lawrence E Graves wrote: > SELinux is preventing /usr/libexec/gnome-session-check-accelerated-helper from 'read, write' accesses on the chr_file nvidiactl. > > ***** Plugin device (91.4 confidence) suggests ***************************** > > If you want to allow gnome-session-check-accelerated-helper to have read write access on the nvidiactl chr_file > Then you need to change the label on nvidiactl to a type of a similar device. > Do > # semanage fcontext -a -t SIMILAR_TYPE 'nvidiactl' > # restorecon -v 'nvidiactl' > > ***** Plugin catchall (9.59 confidence) suggests *************************** > > If you believe that gnome-session-check-accelerated-helper should be allowed read write access on the nvidiactl chr_file by default. > Then you should report this as a bug. > You can generate a local policy module to allow this access. > Do > allow this access for now by executing: > # grep gnome-session-c /var/log/audit/audit.log | audit2allow -M mypol > # semodule -i mypol.pp > > Additional Information: > Source Context system_u:system_r:xdm_t:s0-s0:c0.c1023 > Target Context system_u:object_r:device_t:s0 > Target Objects nvidiactl [ chr_file ] > Source gnome-session-c > Source Path /usr/libexec/gnome-session-check-accelerated- > helper > Port <Unknown> > Host Jehovah.localdomain > Source RPM Packages gnome-session-3.0.1-2.fc15 > Target RPM Packages > Policy RPM selinux-policy-3.9.16-26.fc15 > Selinux Enabled True > Policy Type targeted > Enforcing Mode Enforcing > Host Name Jehovah.localdomain > Platform Linux Jehovah.localdomain 2.6.38.7-30.fc15.x86_64 > #1 SMP Fri May 27 05:15:53 UTC 2011 x86_64 x86_64 > Alert Count 5 > First Seen Mon 06 Jun 2011 06:40:55 AM MDT > Last Seen Tue 07 Jun 2011 05:20:46 AM MDT > Local ID e2321259-3895-45f0-8eaa-1d2294ce8e89 > > Raw Audit Messages > type=AVC msg=audit(1307445646.599:49): avc: denied { read write } for pid=1630 comm="gnome-session-c" name="nvidiactl" dev=devtmpfs ino=15320 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file > > > type=SYSCALL msg=audit(1307445646.599:49): arch=x86_64 syscall=open success=no exit=EACCES a0=7fff4eae8860 a1=2 a2=7fff4eae886e a3=7fff4eae81f0 items=0 ppid=1623 pid=1630 auid=4294967295 uid=42 gid=42 euid=42 suid=42 fsuid=42 egid=42 sgid=42 fsgid=42 tty=(none) ses=4294967295 comm=gnome-session-c exe=/usr/libexec/gnome-session-check-accelerated-helper subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null) > > Hash: gnome-session-c,xdm_t,device_t,chr_file,read,write > > audit2allow > > #============= xdm_t ============== > allow xdm_t device_t:chr_file { read write }; > > audit2allow -R > > #============= xdm_t ============== > allow xdm_t device_t:chr_file { read write }; > > Please do not spam the list with these. Open a bugzilla and someone will take care of you. In this case you are using a proprietary driver that is not creating the device with the correct label. You can either create a local custom module to allow this access, or you can try to run a restorecon on the device during boot to get it labeled correctly. In F16 we have added filename transition labeling which should allow us to get this label correct even when proprietary apps do not create devices correctly. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/ iEYEARECAAYFAk3uLVQACgkQrlYvE4MpobMZhACdE/3ERW9YRRu6MetaKN2IV0dV 0rsAoMV1nMyD+65s2uCN7G+6ktBPIeYt =LYko -----END PGP SIGNATURE----- -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines