Bug 1544922
| Summary: | SElinux errors after fix of Bug #1486803 by rdma-core-15-5 | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | R P Herrold <herrold> | |
| Component: | selinux-policy | Assignee: | Lukas Vrabec <lvrabec> | |
| Status: | CLOSED DUPLICATE | QA Contact: | Milos Malik <mmalik> | |
| Severity: | high | Docs Contact: | ||
| Priority: | high | |||
| Version: | 7.4 | CC: | ajb, atragler, baumanmo, ddutile, dwd, egarver, fs-qe, herrold, igkioka, iptables-maint-list, jarod, kajtzu, lvrabec, mgrepl, mmalik, myllynen, pasik, plautrba, psutter, rdma-dev-team, redhat-bugzilla, riehecky, ssekidde, steved, tis, todoleza, toracat | |
| Target Milestone: | rc | Keywords: | Triaged, ZStream | |
| Target Release: | --- | |||
| Hardware: | All | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | Doc Type: | If docs needed, set a value | ||
| Doc Text: | Story Points: | --- | ||
| Clone Of: | 1544921 | |||
| : | 1544923 (view as bug list) | Environment: | ||
| Last Closed: | 2018-02-19 09:36:32 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | 1438937, 1486803, 1544921 | |||
| Bug Blocks: | 1477413, 1481207, 1486871, 1491963, 1504647, 1544923 | |||
|
Description
R P Herrold
2018-02-13 18:46:44 UTC
The needed additional permissions for SELinux turn out to have had some hidden additional parts needed, and I believe a better rule is:
[root@router ~]# cat my-grep.te
module my-grep 1.0;
require {
type iptables_t;
type modules_conf_t;
class file { getattr ioctl open read };
}
#============= iptables_t ==============
#!!!! This avc is allowed in the current policy
allow iptables_t modules_conf_t:file { getattr ioctl open read };
[root@router ~]#
Which version of selinux-policy do you use? # rpm -qa selinux-policy\* SELinux denials mentioned in comment#0 are already addressed in: * https://bugzilla.redhat.com/show_bug.cgi?id=1438937 [root@router ~]# rpm -qa selinux-policy\* selinux-policy-targeted-3.13.1-166.el7_4.7.noarch selinux-policy-3.13.1-166.el7_4.7.noarch selinux-policy-devel-3.13.1-166.el7_4.7.noarch @Milos Malik in bug 1438937, there is no patch set shown, and the proposed addition at comment #5 is only partial, catching only one of the four needed additions (as did my intiial filing, before doing more testing locally Can someone update the title? rhel-7.5 is using rdma-core-15-5 at this point. I realize this was a clone, but update to be accurate, or re:Subject to the proper bz issue. thanks. [root@rhel7 ~]# rpm -q selinux-policy
selinux-policy-3.13.1-190.el7.noarch
[root@rhel7 ~]# sesearch -A -s iptables_t -t modules_conf_t -c file
Found 1 semantic av rules:
allow iptables_t modules_conf_t : file { ioctl read getattr lock open } ;
*** This bug has been marked as a duplicate of bug 1438937 ***
|