[Bug 733001] pluginscanner: Selinux enhanced file rights not handled correctly
GStreamer (bugzilla.gnome.org)
bugzilla at gnome.org
Wed Oct 29 01:34:47 PDT 2014
https://bugzilla.gnome.org/show_bug.cgi?id=733001
GStreamer | gstreamer (core) | git
--- Comment #9 from kasberger at heidenhain.de 2014-10-29 08:34:44 UTC ---
Generally here is a misunderstanding of SELinux concepts and how it provides
access and execution rights. It is widespreeded on all distributions. If you
want to know more then please read this article
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/4/html/SELinux_Guide/index.html
But introducing the SELinux machinery for a one special case could be a little
bit too much overhead. I have implemented this my code and it is working.
Even if this directory is simply execute protected I run into the same issue.
The question is : should a plugin be blacklist permanently because at the time
of the first read it I was not accessible/executeable ?
IMO if we have a cache then it should intelligent enough to handle this.
Otherwise the user has to manipulate its system manually. And this is never ok.
If I do not get any reply I will it rest in peace
in gst_registry.c : gst_registry_scan_path_level(
if (g_module_supported () != FALSE) {
flags = G_MODULE_BIND_LOCAL | G_MODULE_BIND_LAZY;
module = g_module_open (filename, flags);
if (module == NULL) {
GST_TRACE_OBJECT (context->registry, "%s file is secured by SELinux,
ignoring",filename);
g_free (filename);
continue;
}
g_module_close(module);
}
--
Configure bugmail: https://bugzilla.gnome.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the QA contact for the bug.
You are the assignee for the bug.
More information about the gstreamer-bugs
mailing list