Bug 1017889

Summary: sddm selinux issues
Product: [Fedora] Fedora Reporter: Orion Poplawski <orion>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED CURRENTRELEASE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 20CC: dominick.grift, dwalsh, lvrabec, mgrepl
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-07-25 20:29:39 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Orion Poplawski 2013-10-10 17:20:49 UTC
Description of problem:

/usr/bin/sddm is labeled bin_t and runs in initrc_t.  Presumably it should be labeled xdm_exec_t.

When labeled xdm_exec_t I see the following denials in permissive mode:

type=AVC msg=audit(1381425470.880:160): avc:  denied  { write } for  pid=1226 comm="xauth" name="sddm" dev="tmpfs" ino=11273 scontext=system_u:system_r:xauth_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=dir
type=AVC msg=audit(1381425470.880:160): avc:  denied  { add_name } for  pid=1226 comm="xauth" name="A:0-Lsrash-c" scontext=system_u:system_r:xauth_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=dir
type=AVC msg=audit(1381425470.880:160): avc:  denied  { create } for  pid=1226 comm="xauth" name="A:0-Lsrash-c" scontext=system_u:system_r:xauth_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=file
type=AVC msg=audit(1381425470.880:160): avc:  denied  { open } for  pid=1226 comm="xauth" path="/run/sddm/A:0-Lsrash-c" dev="tmpfs" ino=20485 scontext=system_u:system_r:xauth_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=file
type=AVC msg=audit(1381425470.881:161): avc:  denied  { link } for  pid=1226 comm="xauth" name="A:0-Lsrash-c" dev="tmpfs" ino=20485 scontext=system_u:system_r:xauth_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=file
type=AVC msg=audit(1381425470.882:162): avc:  denied  { remove_name } for  pid=1226 comm="xauth" name="A:0-Lsrash-n" dev="tmpfs" ino=20486 scontext=system_u:system_r:xauth_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=dir
type=AVC msg=audit(1381425470.882:162): avc:  denied  { unlink } for  pid=1226 comm="xauth" name="A:0-Lsrash-n" dev="tmpfs" ino=20486 scontext=system_u:system_r:xauth_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=file
type=AVC msg=audit(1381425470.947:163): avc:  denied  { open } for  pid=1229 comm="sddm-greeter" path="/run/sddm/A:0-Lsrash" dev="tmpfs" ino=20486 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=file
type=AVC msg=audit(1381425470.947:164): avc:  denied  { getattr } for  pid=1229 comm="sddm-greeter" path="/run/sddm/A:0-Lsrash" dev="tmpfs" ino=20486 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:var_run_t:s0 tclass=file

Version-Release number of selected component (if applicable):
selinux-policy-3.12.1-75.fc20.noarch

Comment 1 Orion Poplawski 2014-07-25 20:29:39 UTC
Looks like this got fixed a while back.