Bug 1233110

Summary: SELinux is preventing /usr/sbin/usbmuxd from 'read' accesses on the file +usb:2-1:1.0.
Product: [Fedora] Fedora Reporter: M2wa2 <willymacha13>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED DUPLICATE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 23CC: dominick.grift, dwalsh, lvrabec, mgrepl, plautrba
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
Whiteboard: abrt_hash:ae26ef4816606ea8bf00eba2466e9a893d29046277a99e85b395c1a8ba104a5a
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-03-29 16:02:53 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description M2wa2 2015-06-18 09:00:55 UTC
Description of problem:
SELinux is preventing /usr/sbin/usbmuxd from 'read' accesses on the file +usb:2-1:1.0.

*****  Plugin catchall (100. confidence) suggests   **************************

If you believe that usbmuxd should be allowed read access on the +usb:2-1:1.0 file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep usbmuxd /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                system_u:system_r:usbmuxd_t:s0
Target Context                system_u:object_r:udev_var_run_t:s0
Target Objects                +usb:2-1:1.0 [ file ]
Source                        usbmuxd
Source Path                   /usr/sbin/usbmuxd
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           usbmuxd-1.1.0-4.fc23.x86_64
Target RPM Packages           
Policy RPM                    selinux-policy-3.13.1-129.fc23.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 4.1.0-0.rc7.git1.1.fc23.x86_64 #1
                              SMP Fri Jun 12 19:31:11 UTC 2015 x86_64 x86_64
Alert Count                   2
First Seen                    2015-06-18 11:58:16 EAT
Last Seen                     2015-06-18 11:58:16 EAT
Local ID                      67c4bc6b-47cd-4337-8605-cb84098fd911

Raw Audit Messages
type=AVC msg=audit(1434617896.251:227): avc:  denied  { read } for  pid=2380 comm="usbmuxd" name="+usb:2-1:1.0" dev="tmpfs" ino=13661 scontext=system_u:system_r:usbmuxd_t:s0 tcontext=system_u:object_r:udev_var_run_t:s0 tclass=file permissive=0


type=SYSCALL msg=audit(1434617896.251:227): arch=x86_64 syscall=open success=no exit=EACCES a0=7ffda9f7ebe0 a1=80000 a2=1b6 a3=a7a330 items=0 ppid=1 pid=2380 auid=4294967295 uid=113 gid=113 euid=113 suid=113 fsuid=113 egid=113 sgid=113 fsgid=113 tty=(none) ses=4294967295 comm=usbmuxd exe=/usr/sbin/usbmuxd subj=system_u:system_r:usbmuxd_t:s0 key=(null)

Hash: usbmuxd,usbmuxd_t,udev_var_run_t,file,read

Version-Release number of selected component:
selinux-policy-3.13.1-129.fc23.noarch

Additional info:
reporter:       libreport-2.6.0
hashmarkername: setroubleshoot
kernel:         4.1.0-0.rc7.git1.1.fc23.x86_64
type:           libreport

Comment 1 Jan Kurik 2015-07-15 13:59:05 UTC
This bug appears to have been reported against 'rawhide' during the Fedora 23 development cycle.
Changing version to '23'.

(As we did not run this process for some time, it could affect also pre-Fedora 23 development
cycle bugs. We are very sorry. It will help us with cleanup during Fedora 23 End Of Life. Thank you.)

More information and reason for this action is here:
https://fedoraproject.org/wiki/BugZappers/HouseKeeping/Fedora23

Comment 2 Lukas Vrabec 2016-03-29 16:02:53 UTC

*** This bug has been marked as a duplicate of bug 1321162 ***