Bug 1012109

Summary: RHEL7 ipa-adtrust-install AVC denials for winbind_t read and write key
Product: Red Hat Enterprise Linux 7 Reporter: Scott Poore <spoore>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED CURRENTRELEASE QA Contact: Milos Malik <mmalik>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 7.0CC: mkosek, mmalik, riehecky, sbose
Target Milestone: rc   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: selinux-policy-3.12.1-85.el7 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-06-13 13:27:35 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Scott Poore 2013-09-25 17:52:37 UTC
Description of problem:

After running ipa-adtrust-install, I see AVC denials for winbind:

time->Wed Sep 25 12:38:16 2013
type=SYSCALL msg=audit(1380130696.038:610): arch=c000003e syscall=248 success=yes exit=328706324 a0=7f1f35139b2e a1=7f1f3bed3910 a2=0 a3=0 items=0 ppid=18147 pid=18150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="winbindd" exe="/usr/sbin/winbindd" subj=system_u:system_r:winbind_t:s0 key=(null)
type=AVC msg=audit(1380130696.038:610): avc:  denied  { write } for  pid=18150 comm="winbindd" scontext=system_u:system_r:winbind_t:s0 tcontext=system_u:system_r:winbind_t:s0 tclass=key
----
time->Wed Sep 25 12:38:16 2013
type=SYSCALL msg=audit(1380130696.038:611): arch=c000003e syscall=250 success=yes exit=4 a0=b a1=1397a914 a2=0 a3=0 items=0 ppid=18147 pid=18150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="winbindd" exe="/usr/sbin/winbindd" subj=system_u:system_r:winbind_t:s0 key=(null)
type=AVC msg=audit(1380130696.038:611): avc:  denied  { read } for  pid=18150 comm="winbindd" scontext=system_u:system_r:winbind_t:s0 tcontext=system_u:system_r:winbind_t:s0 tclass=key


Version-Release number of selected component (if applicable):
selinux-policy-3.12.1-80.el7.noarch

How reproducible:
unknown at the moment.  expected always

Steps to Reproduce:
1.  Install IPA server
2.  ipa-adtrust-install

Actual results:

AVCs above.

Expected results:

non AVC denials.

Additional info:

Comment 2 Miroslav Grepl 2013-09-26 08:41:11 UTC
Milos,
any chance are you getting it for more domains?

Comment 3 Miroslav Grepl 2013-10-03 08:59:12 UTC
#============= winbind_t ==============

#!!!! This avc is allowed in the current policy
allow winbind_t self:key read;

Comment 4 Miroslav Grepl 2013-10-03 08:59:59 UTC
Has been fixed.

Comment 5 Miroslav Grepl 2013-10-03 09:00:50 UTC
*** Bug 1012051 has been marked as a duplicate of this bug. ***

Comment 6 Miroslav Grepl 2013-10-03 09:02:24 UTC
*** Bug 1009177 has been marked as a duplicate of this bug. ***

Comment 7 Martin Kosek 2013-10-03 10:57:38 UTC
I can confirm I was able to install IPA with enforced SELinux with the new version of selinux-policy. Thanks Mirek!

Comment 10 Ludek Smid 2014-06-13 13:27:35 UTC
This request was resolved in Red Hat Enterprise Linux 7.0.

Contact your manager or support representative in case you have further questions about the request.