On 3/4/07, Tom London <selinux@xxxxxxxxx> wrote:
Running latest Rawhide, targeted/enforcing. Trying to unmount/eject CD by right-clicking on its icon and selecting 'eject' does the unmount, but fails to eject (produces an error popup). Found this in /var/log/audit/audit.log: type=AVC msg=audit(1173069472.190:85): avc: denied { setexec } for pid=10486 comm="userhelper" scontext=system_u:system_r:hald_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=process type=SYSCALL msg=audit(1173069472.190:85): arch=40000003 syscall=4 success=no exit=-13 a0=4 a1=8cefa48 a2=1c a3=43469be9 items=0 ppid=10485 pid=10486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=system_u:system_r:hald_t:s0 key=(null)
Running this with enforcing=0 (and with today's hal update), I get: type=AVC msg=audit(1173105610.525:31): avc: denied { write } for pid=4022 comm="userhelper" name="eject" dev=dm-0 ino=11075786 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file type=SYSCALL msg=audit(1173105610.525:31): arch=40000003 syscall=5 success=yes exit=3 a0=8140240 a1=2 a2=bfc60de4 a3=0 items=0 ppid=4021 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=system_u:system_r:hald_t:s0 key=(null) type=USER_AUTH msg=audit(1173105610.525:32): user pid=4022 uid=0 auid=4294967295 subj=system_u:system_r:hald_t:s0 msg='PAM: authentication acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=USER_ACCT msg=audit(1173105610.525:33): user pid=4022 uid=0 auid=4294967295 subj=system_u:system_r:hald_t:s0 msg='PAM: accounting acct=root : exe="/usr/sbin/userhelper" (hostname=?, addr=?, terminal=? res=success)' type=AVC msg=audit(1173105610.525:34): avc: denied { setexec } for pid=4022 comm="userhelper" scontext=system_u:system_r:hald_t:s0 tcontext=system_u:system_r:hald_t:s0 tclass=process type=SYSCALL msg=audit(1173105610.525:34): arch=40000003 syscall=4 success=yes exit=34 a0=4 a1=81402a8 a2=22 a3=43469be9 items=0 ppid=4021 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="userhelper" exe="/usr/sbin/userhelper" subj=system_u:system_r:hald_t:s0 key=(null) type=AVC msg=audit(1173105610.525:35): avc: denied { transition } for pid=4022 comm="userhelper" name="eject" dev=dm-0 ino=5481827 scontext=system_u:system_r:hald_t:s0 tcontext=system_u:system_r:unconfined_t:s0 tclass=process type=AVC msg=audit(1173105610.525:35): avc: denied { siginh } for pid=4022 comm="eject" scontext=system_u:system_r:hald_t:s0 tcontext=system_u:system_r:unconfined_t:s0 tclass=process type=AVC msg=audit(1173105610.525:35): avc: denied { rlimitinh } for pid=4022 comm="eject" scontext=system_u:system_r:hald_t:s0 tcontext=system_u:system_r:unconfined_t:s0 tclass=process type=AVC msg=audit(1173105610.525:35): avc: denied { noatsecure } for pid=4022 comm="eject" scontext=system_u:system_r:hald_t:s0 tcontext=system_u:system_r:unconfined_t:s0 tclass=process type=SYSCALL msg=audit(1173105610.525:35): arch=40000003 syscall=11 success=yes exit=0 a0=8141180 a1=bfc61090 a2=81411d0 a3=2 items=0 ppid=4021 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) comm="eject" exe="/usr/sbin/eject" subj=system_u:system_r:unconfined_t:s0 key=(null) type=AVC_PATH msg=audit(1173105610.525:35): path="/usr/sbin/eject" -- Tom London -- fedora-selinux-list mailing list fedora-selinux-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-selinux-list