Bug 184394
| Summary: | policy-targeted does not allow loop-mounting | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Konstantin Ryabitsev <icon> |
| Component: | selinux-policy-targeted | Assignee: | Daniel Walsh <dwalsh> |
| Status: | CLOSED RAWHIDE | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | rawhide | CC: | wtogami |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2006-03-08 21:08:47 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 150222 | ||
Hmm... confirmed broken in yesterday's rawhide. Attempt above losetup command:
==============================
audit(1141831550.671:130): avc: denied { read write } for pid=21571
comm="losetup" name="file.ext3" dev=dm-0 ino=3993807
scontext=root:system_r:fsadm_t:s0-s0:c0.c255
tcontext=root:object_r:user_home_t:s0 tclass=file
Attempt loopback mount of boot.iso:
===================================
audit(1141832440.887:131): avc: denied { read write } for pid=21682
comm="mount" name="boot.iso" dev=dm-0 ino=9722598
scontext=root:system_r:mount_t:s0-s0:c0.c255 tcontext=root:object_r:tmp_t:s0
tclass=file
Confirmed fixed in selinux-policy-2.2.23-8 Works great! You guys rock. :) |
Description of problem: Loop-mounting is impossible with selinux-policy-targeted in enforcing mode. [root@purush ~]# losetup /dev/loop0 file.ext3 file.ext3: Permission denied audit.log: type=AVC msg=audit(1141835384.388:13): avc: denied { read write } for pid=1807 comm="losetup" name="file.ext3" dev=sda1 ino=752212 scontext=root:system_r:fsadm_t:s0-s0:c0.c255 tcontext=root:object_r:user_home_t:s0 tclass=file type=SYSCALL msg=audit(1141835384.388:13): arch=40000003 syscall=5 success=no exit=-13 a0=bfefbcae a1=8002 a2=0 a3=8002 items=1 pid=1807 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 comm="losetup" exe="/sbin/losetup" type=CWD msg=audit(1141835384.388:13): cwd="/root" type=PATH msg=audit(1141835384.388:13): item=0 name="file.ext3" flags=101 inode=752212 dev=08:01 mode=0100644 ouid=0 ogid=0 rdev=00:00 Version-Release number of selected component (if applicable): selinux-policy-targeted-2.2.23-6 How reproducible: Every time Steps to Reproduce: 1. dd if=/dev/zero of=file.ext3 bs=1M count=32 2. losetup /dev/loop0 file.ext3 or 1. mount -o loop boot.iso /mnt/tmp Actual results: Permission denied Expected results: Loop-mounting should be allowed.