Bug 1037484
Summary: | bmc-watchdog runs as init_t | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Milos Malik <mmalik> |
Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | Milos Malik <mmalik> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 7.0 | CC: | lvrabec, mgrepl, mmalik |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | selinux-policy-3.12.1-110.el7 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2014-06-13 12:49:30 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 877026 | ||
Bug Blocks: | 848829, 1042753 |
Description
Milos Malik
2013-12-03 09:30:35 UTC
Milos, does it work with "watchdog_exec_t"? I will add commit 63b4dceb33ffbfb86516a257926a711b4c653d45 Author: Miroslav Grepl <mgrepl> Date: Tue Dec 3 11:02:45 2013 +0100 Allow watchdog to be executed from cron if yes. After assigning watchdog_exec_t label to /usr/sbin/bmc-watchdog file following AVCs appeared in enforcing mode: ---- type=PATH msg=audit(12/03/2013 11:07:16.975:76987) : item=0 name=/dev/ipmi0 inod e=4460792 dev=00:05 mode=character,644 ouid=root ogid=root rdev=f6:00 obj=unconf ined_u:object_r:ipmi_device_t:s0 objtype=NORMAL type=CWD msg=audit(12/03/2013 11:07:16.975:76987) : cwd=/ type=SYSCALL msg=audit(12/03/2013 11:07:16.975:76987) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f25959905c8 a1=O_RDWR a2=0x7f25980ab310 a3=0x7fffd0711710 items=1 ppid=18756 pid=18757 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=bmc-watchdog exe=/usr/sbin/bmc-watchdog subj=system_u:system_r:watchdog_t:s0 key=(null) type=AVC msg=audit(12/03/2013 11:07:16.975:76987) : avc: denied { read write } for pid=18757 comm=bmc-watchdog name=ipmi0 dev="devtmpfs" ino=4460792 scontext=system_u:system_r:watchdog_t:s0 tcontext=unconfined_u:object_r:ipmi_device_t:s0 tclass=chr_file ---- type=PATH msg=audit(12/03/2013 11:07:16.976:76988) : item=0 name=/dev/mem inode=1027 dev=00:05 mode=character,640 ouid=root ogid=kmem rdev=01:01 obj=system_u:object_r:memory_device_t:s0 objtype=NORMAL type=CWD msg=audit(12/03/2013 11:07:16.976:76988) : cwd=/ type=SYSCALL msg=audit(12/03/2013 11:07:16.976:76988) : arch=x86_64 syscall=open success=no exit=-13(Permission denied) a0=0x7f2595997d2b a1=O_RDONLY a2=0x10000 a3=0x7fffd0711bb0 items=1 ppid=1 pid=18757 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=bmc-watchdog exe=/usr/sbin/bmc-watchdog subj=system_u:system_r:watchdog_t:s0 key=(null) type=AVC msg=audit(12/03/2013 11:07:16.976:76988) : avc: denied { read } for pid=18757 comm=bmc-watchdog name=mem dev="devtmpfs" ino=1027 scontext=system_u:system_r:watchdog_t:s0 tcontext=system_u:object_r:memory_device_t:s0 tclass=chr_file ---- type=PATH msg=audit(12/03/2013 11:07:16.977:77037) : item=0 name=/var/lib/freeipmi/ipckey inode=2494726 dev=08:04 mode=file,644 ouid=root ogid=root rdev=00:00 obj=system_u:object_r:var_lib_t:s0 objtype=NORMAL type=CWD msg=audit(12/03/2013 11:07:16.977:77037) : cwd=/ type=SYSCALL msg=audit(12/03/2013 11:07:16.977:77037) : arch=x86_64 syscall=stat success=no exit=-13(Permission denied) a0=0x7f2595990541 a1=0x7fffd0711890 a2=0x7fffd0711890 a3=0x3 items=1 ppid=1 pid=18757 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=bmc-watchdog exe=/usr/sbin/bmc-watchdog subj=system_u:system_r:watchdog_t:s0 key=(null) type=AVC msg=audit(12/03/2013 11:07:16.977:77037) : avc: denied { getattr } for pid=18757 comm=bmc-watchdog path=/var/lib/freeipmi/ipckey dev="sda4" ino=2494726 scontext=system_u:system_r:watchdog_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=file ---- Milos, I see $ rpm -ql freeipmi-bmc-watchdog /etc/sysconfig/bmc-watchdog /usr/lib/systemd/system/bmc-watchdog.service /usr/sbin/bmc-watchdog /usr/share/doc/freeipmi/COPYING.bmc-watchdog /usr/share/doc/freeipmi/DISCLAIMER.bmc-watchdog /usr/share/doc/freeipmi/DISCLAIMER.bmc-watchdog.UC /usr/share/man/man8/bmc-watchdog.8.gz on my F20 system. It looks the /var/lib/freeipmi is created on the fly. It's a part of another package: # rpm -qf /var/lib/freeipmi freeipmi-1.2.9-2.el7.x86_64 # rpm -qf /var/lib/freeipmi/ipckey freeipmi-1.2.9-2.el7.x86_64 # Ok, taking back. We have more services from freeipmi which run as init_t. So we would introduce freeipmi.pp https://bugzilla.redhat.com/show_bug.cgi?id=1037475 https://bugzilla.redhat.com/show_bug.cgi?id=1037459 commit dee0ab128c1730828e041645811da995a2929f0b Author: Miroslav Grepl <mgrepl> Date: Thu Dec 5 17:11:53 2013 +0100 Add policy for freeipmi services commit 635d073c3124218716c94266a511366d3cb69de6 Author: Miroslav Grepl <mgrepl> Date: Thu Dec 12 15:00:06 2013 +0100 Update freeipmi policy This request was resolved in Red Hat Enterprise Linux 7.0. Contact your manager or support representative in case you have further questions about the request. |