Bug 1478609

Summary: selinux denial /var/lib/pcp/pmdas/proc/pmdaproc from using the sys_ptrace capability
Product: Red Hat Enterprise Linux 7 Reporter: Patrick Ladd <pladd>
Component: pcpAssignee: Lukas Berk <lberk>
Status: CLOSED ERRATA QA Contact: Michal Kolar <mkolar>
Severity: low Docs Contact:
Priority: unspecified    
Version: 7.3CC: brolley, fche, lberk, mcermak, mgoodwin, mkolar, nathans
Target Milestone: rc   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: pcp-3.12.2-5.el7 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-04-10 17:06:22 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Patrick Ladd 2017-08-05 02:21:58 UTC
Description of problem:

Running pcp atop caused the following selinux denial: 
===================================
type=SYSCALL msg=audit(1501898555.294:74424): arch=c000003e syscall=0 success=no exit=-13 a0=8 a1=7ffd6b3a34e0 a2=400 a3=2 items=0 ppid=4753 pid=4754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="pmdaproc" exe="/var/lib/pcp/pmdas/proc/pmdaproc" subj=system_u:system_r:pcp_pmcd_t:s0 key=(null)

type=AVC msg=audit(1501898555.294:74424): avc:  denied  { sys_ptrace } for  pid=4754 comm="pmdaproc" capability=19  scontext=system_u:system_r:pcp_pmcd_t:s0 tcontext=system_u:system_r:pcp_pmcd_t:s0 tclass=capability
===================================

Expanded message:
===================================
SELinux is preventing /var/lib/pcp/pmdas/proc/pmdaproc from using the sys_ptrace capability.

Additional Information:
Source Context                system_u:system_r:pcp_pmcd_t:s0
Target Context                system_u:system_r:pcp_pmcd_t:s0
Target Objects                Unknown [ capability ]
Source                        pmdaproc
Source Path                   /var/lib/pcp/pmdas/proc/pmdaproc
Port                          <Unknown>
Host                          pladd.remote.csb
Source RPM Packages           
Target RPM Packages           
Policy RPM                    selinux-policy-3.13.1-102.el7_3.16.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     pladd.remote.csb
Platform                      Linux pladd.remote.csb 3.10.0-514.26.2.el7.x86_64
                              #1 SMP Fri Jun 30 05:26:04 UTC 2017 x86_64 x86_64
Alert Count                   137
First Seen                    2017-08-04 21:52:49 EDT
Last Seen                     2017-08-04 21:57:55 EDT
Local ID                      05732430-0cb9-4a9d-9803-70c1f6c702ad
===================================


Version-Release number of selected component (if applicable):
pcp-3.11.3-4.el7.x86_64
pcp-system-tools-3.11.3-4.el7.x86_64
pcp-gui-3.11.3-4.el7.x86_64
pcp-libs-3.11.3-4.el7.x86_64
pcp-monitor-3.11.3-4.el7.x86_64
pcp-pmda-mounts-3.11.3-4.el7.x86_64
pcp-webapi-3.11.3-4.el7.x86_64
pcp-conf-3.11.3-4.el7.x86_64
python-pcp-3.11.3-4.el7.x86_64


How reproducible:
Each execution

Steps to Reproduce:
1. run "pcp atop"
2. "ausearch -c pmdaproc" shows denial messages

Actual results:
selinux denial

Expected results:
pmdaproc should run without selinux denials

Additional info:

Comment 2 Lukas Berk 2017-08-29 20:05:24 UTC
This rule was added to the selinux policy file:

f5758c47a43b2d061222d55b48193b706229a9e8
Author:     Lukas Berk <lberk>
AuthorDate: Fri Apr 7 11:14:50 2017 -0400
Commit:     Lukas Berk <lberk>
CommitDate: Mon Apr 10 09:35:34 2017 -0400

Which would have made it into pcp-3.11.10, released in May of 2017.

Comment 4 Michal Kolar 2018-02-13 15:01:39 UTC
Reproduced against pcp-3.11.3-4.el7 and verified against pcp-3.12.2-5.el7.

Comment 8 errata-xmlrpc 2018-04-10 17:06:22 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2018:0926