Bug 1451139

Summary: After installing updates, targetd throws numerous SELinux errors
Product: [Fedora] Fedora Reporter: Clark Hale <chale>
Component: targetdAssignee: Tony Asleson <tasleson>
Status: CLOSED EOL QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 25CC: agrover, tasleson
Target Milestone: ---   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-12-12 10:55:01 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
Client program
none
targetd.yaml configuration none

Description Clark Hale 2017-05-15 22:37:08 UTC
Created attachment 1279152 [details]
Client program

Description of problem:

After installing Fedora updates, targetd now fails to provision any target because of SELinux errors.  In a base install (only targetd related packages from updates), targetd works as expected.

Version-Release number of selected component (if applicable):


How reproducible:

Always

Steps to Reproduce:
1. dnf update -y 
2. dnf update targetd -y
3. Create vg-targetd volume group
4. Configure a targetd.yaml, like attachment
5. Run the attached client script (modified from /usr/share/doc/targetd/client)

Actual results:

From audit.log:
type=AVC msg=audit(1494887475.530:240000): avc:  denied  { accept } for  pid=891 comm="targetd" lport=18700 scontext=system_u:system_r:targetd_t:s0 tcontext=system_u:system_r:targetd_t:s0 tclass=tcp_socket permissive=0

	Was caused by:
	The boolean nis_enabled was set incorrectly. 
	Description:
	Allow nis to enabled

	Allow access by executing:
	# setsebool -P nis_enabled 1

After enabling the boolean (which does not seem right):

type=AVC msg=audit(1494887572.370:601394): avc:  denied  { search } for  pid=891 comm="targetd" name="/" dev="configfs" ino=11584 scontext=system_u:system_r:targetd_t:s0 tcontext=system_u:object_r:configfs_t:s0 tclass=dir permissive=0

	Was caused by:
		Missing type enforcement (TE) allow rule.

		You can use audit2allow to generate a loadable module to allow this access.

type=AVC msg=audit(1494887572.370:601395): avc:  denied  { getattr } for  pid=891 comm="targetd" path="/etc/modprobe.d" dev="dm-0" ino=25259817 scontext=system_u:system_r:targetd_t:s0 tcontext=system_u:object_r:modules_conf_t:s0 tclass=dir permissive=0

	Was caused by:
		Missing type enforcement (TE) allow rule.

		You can use audit2allow to generate a loadable module to allow this access.

type=AVC msg=audit(1494887572.370:601396): avc:  denied  { search } for  pid=891 comm="targetd" name="modules" dev="dm-0" ino=25331729 scontext=system_u:system_r:targetd_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir permissive=0

	Was caused by:
		Missing type enforcement (TE) allow rule.

		You can use audit2allow to generate a loadable module to allow this access.

type=AVC msg=audit(1494887572.370:601397): avc:  denied  { search } for  pid=891 comm="targetd" name="modules" dev="dm-0" ino=25331729 scontext=system_u:system_r:targetd_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir permissive=0

	Was caused by:
		Missing type enforcement (TE) allow rule.

		You can use audit2allow to generate a loadable module to allow this access.

type=AVC msg=audit(1494887572.370:601398): avc:  denied  { search } for  pid=891 comm="targetd" name="modules" dev="dm-0" ino=25331729 scontext=system_u:system_r:targetd_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir permissive=0

	Was caused by:
		Missing type enforcement (TE) allow rule.

		You can use audit2allow to generate a loadable module to allow this access.

type=AVC msg=audit(1494887572.370:601399): avc:  denied  { search } for  pid=891 comm="targetd" name="modules" dev="dm-0" ino=25331729 scontext=system_u:system_r:targetd_t:s0 tcontext=system_u:object_r:modules_object_t:s0 tclass=dir permissive=0

	Was caused by:
		Missing type enforcement (TE) allow rule.

		You can use audit2allow to generate a loadable module to allow this access.


Expected results:

Targetd provisions a logical volume and adds it to a target


Additional info:

When SELinux is set to permissive mode, the targetd runs as expected.

Comment 1 Clark Hale 2017-05-15 22:37:41 UTC
Created attachment 1279153 [details]
targetd.yaml configuration

Comment 2 Fedora End Of Life 2017-12-12 10:55:01 UTC
Fedora 25 changed to end-of-life (EOL) status on 2017-12-12. Fedora 25 is
no longer maintained, which means that it will not receive any further
security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of
Fedora please feel free to reopen this bug against that version. If you
are unable to reopen this bug, please file a new report against the
current release. If you experience problems, please add a comment to this
bug.

Thank you for reporting this bug and we are sorry it could not be fixed.