Bug 1703241

Summary: SELinux prevents sysadm_u from D-bus talking to rtkit-daemon
Product: Red Hat Enterprise Linux 8 Reporter: Milos Malik <mmalik>
Component: selinux-policyAssignee: Lukas Vrabec <lvrabec>
Status: CLOSED ERRATA QA Contact: Milos Malik <mmalik>
Severity: medium Docs Contact:
Priority: medium    
Version: ---CC: lvrabec, mmalik, plautrba, ssekidde, zpytela
Target Milestone: rc   
Target Release: 8.1   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: selinux-policy-3.14.3-6.el8 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
: 1720546 (view as bug list) Environment:
Last Closed: 2019-11-05 22:11:27 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1778780    

Description Milos Malik 2019-04-25 21:05:28 UTC
Description of problem:

Version-Release number of selected component (if applicable):
rtkit-0.11-19.el8.x86_64
selinux-policy-3.14.3-1.el8.noarch
selinux-policy-devel-3.14.3-1.el8.noarch
selinux-policy-doc-3.14.3-1.el8.noarch
selinux-policy-minimum-3.14.3-1.el8.noarch
selinux-policy-mls-3.14.3-1.el8.noarch
selinux-policy-sandbox-3.14.3-1.el8.noarch
selinux-policy-targeted-3.14.3-1.el8.noarch

How reproducible:
 * always

Steps to Reproduce:
1. get a RHEL-8.0 machine
2. log in as sysadm_u user
3. run following command:
$ gdbus introspect --system --object-path / --dest org.freedesktop.RealtimeKit1

Actual results:
----
type=USER_AVC msg=audit(04/25/2019 22:19:22.788:2485) : pid=14497 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc:  denied  { send_msg } for msgtype=method_call interface=org.freedesktop.RealtimeKit1 member=MakeThreadHighPriority dest=org.freedesktop.RealtimeKit1 spid=15814 tpid=19065 scontext=sysadm_u:sysadm_r:sysadm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:rtkit_daemon_t:s0 tclass=dbus permissive=0  exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?' 
----
type=USER_AVC msg=audit(04/25/2019 22:19:22.863:2486) : pid=14497 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc:  denied  { send_msg } for msgtype=method_call interface=org.freedesktop.DBus.Properties member=Get dest=org.freedesktop.RealtimeKit1 spid=15814 tpid=19065 scontext=sysadm_u:sysadm_r:sysadm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:rtkit_daemon_t:s0 tclass=dbus permissive=0  exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?' 
----

Expected results:
 * no SELinux denials

Additional info:
 * the scenario works fine for other confined users like user_u or staff_u

Comment 1 Zdenek Pytela 2019-04-26 07:33:22 UTC
A PR has been created to address this issue.

https://github.com/fedora-selinux/selinux-policy/pull/261

Comment 13 errata-xmlrpc 2019-11-05 22:11:27 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2019:3547