| Summary: | AVC errors for kadmin | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Steeve Goveas <sgoveas> |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | Milos Malik <mmalik> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 7.0 | CC: | mmalik, riehecky, sbose |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | selinux-policy-3.12.1-114.el7 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2014-06-13 12:50:11 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
This request was resolved in Red Hat Enterprise Linux 7.0. Contact your manager or support representative in case you have further questions about the request. |
Version-Release number of selected component (if applicable): selinux-policy-3.12.1-103.el7.noarch How reproducible: always Info: Searching AVC errors produced since 1386332814.95 (Fri Dec 6 07:26:54 2013) Searching logs... Running '/usr/bin/env LC_ALL=en_US.UTF-8 /sbin/ausearch -m AVC -m USER_AVC -m SELINUX_ERR -ts 12/06/2013 07:26:54 < /dev/null >/mnt/testarea/tmp.rhts-db-submit-result.HNKVIl 2>&1' ---- time->Fri Dec 6 07:28:08 2013 type=USER_AVC msg=audit(1386332888.066:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=4) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' ---- time->Fri Dec 6 07:28:08 2013 type=USER_AVC msg=audit(1386332888.066:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: received policyload notice (seqno=5) exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' ---- time->Fri Dec 6 07:28:19 2013 type=PATH msg=audit(1386332899.370:221): item=0 name=(null) inode=69386259 dev=fd:01 mode=0140666 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:sssd_var_lib_t:s0 objtype=NORMAL type=SOCKADDR msg=audit(1386332899.370:221): saddr=01002F7661722F6C69622F7373732F70697065732F7061630000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 type=SYSCALL msg=audit(1386332899.370:221): arch=c000003e syscall=42 success=no exit=-13 a0=20 a1=7fffe65f2680 a2=6e a3=1 items=1 ppid=1 pid=15750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kadmind" exe="/usr/sbin/kadmind" subj=system_u:system_r:kadmind_t:s0 key=(null) type=AVC msg=audit(1386332899.370:221): avc: denied { write } for pid=15750 comm="kadmind" name="pac" dev="dm-1" ino=69386259 scontext=system_u:system_r:kadmind_t:s0 tcontext=system_u:object_r:sssd_var_lib_t:s0 tclass=sock_file ---- time->Fri Dec 6 07:28:27 2013 type=PATH msg=audit(1386332907.973:222): item=0 name=(null) inode=69386259 dev=fd:01 mode=0140666 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:sssd_var_lib_t:s0 objtype=NORMAL type=SOCKADDR msg=audit(1386332907.973:222): saddr=01002F7661722F6C69622F7373732F70697065732F7061630000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 type=SYSCALL msg=audit(1386332907.973:222): arch=c000003e syscall=42 success=no exit=-13 a0=20 a1=7fffe65f2680 a2=6e a3=1 items=1 ppid=1 pid=15750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kadmind" exe="/usr/sbin/kadmind" subj=system_u:system_r:kadmind_t:s0 key=(null) type=AVC msg=audit(1386332907.973:222): avc: denied { write } for pid=15750 comm="kadmind" name="pac" dev="dm-1" ino=69386259 scontext=system_u:system_r:kadmind_t:s0 tcontext=system_u:object_r:sssd_var_lib_t:s0 tclass=sock_file Fail: AVC messages found. Checking for errors... Using stronger AVC checks. Define empty RHTS_OPTION_STRONGER_AVC parameter if this causes any problems. Running 'cat /mnt/testarea/tmp.rhts-db-submit-result.HNKVIl | /sbin/ausearch -m AVC -m SELINUX_ERR' Fail: AVC messages found. Running 'cat %s | /sbin/ausearch -m USER_AVC >/mnt/testarea/tmp.rhts-db-submit-result.mhgX9q 2>&1' Info: No AVC messages found. /bin/grep 'avc: ' /mnt/testarea/dmesg.log | /bin/grep --invert-match TESTOUT.log No AVC messages found in dmesg Running '/usr/sbin/sestatus' SELinux status: enabled SELinuxfs mount: /sys/fs/selinux SELinux root directory: /etc/selinux Loaded policy name: targeted Current mode: enforcing Mode from config file: enforcing Policy MLS status: enabled Policy deny_unknown status: allowed Max kernel policy version: 28 Running 'rpm -q selinux-policy || true' selinux-policy-3.12.1-103.el7.noarch Expected results: Additional info: