Bug 192566
| Summary: | xfs AVC w/ nss_ldap breaks X | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Ian Pilcher <arequipeno> | ||||
| Component: | selinux-policy-targeted | Assignee: | Daniel Walsh <dwalsh> | ||||
| Status: | CLOSED RAWHIDE | QA Contact: | |||||
| Severity: | high | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | 5 | CC: | |||||
| Target Milestone: | --- | Keywords: | SELinux | ||||
| Target Release: | --- | ||||||
| Hardware: | i686 | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2006-08-01 15:25:19 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | |||||||
| Bug Blocks: | 192555 | ||||||
| Attachments: |
|
||||||
|
Description
Ian Pilcher
2006-05-20 20:06:02 UTC
Created attachment 129768 [details]
audit.log from xfs startup
Workaround is to add 'xfs' user to nss_initgroups_ignoreusers in /etc/ldap.conf. Fixed in selinux-policy-2.2.47-3 It still does not work for me. I installed selinux-policy-targeted-2.2.47-3.fc5,
did a complete relabeling, but still get the following audit messages when
trying to start xfs (by "service xfs restart"):
type=AVC msg=audit(1152024317.140:105): avc: denied { read } for pid=2973
comm="xfs" name="urandom" dev=tmpfs ino=1640 scontext=root:system_r:xfs_t:s0
tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file
type=SYSCALL msg=audit(1152024317.140:105): arch=40000003 syscall=5 success=no
exit=-13 a0=a055dc a1=900 a2=108 a3=bf814f34 items=1 pid=2973 auid=0 uid=0
gid=43 euid=0 suid=0 fsuid=0 egid=43 sgid=43 fsgid=43 tty=(none) comm="xfs"
exe="/usr/bin/xfs" subj=root:system_r:xfs_t:s0
type=CWD msg=audit(1152024317.140:105): cwd="/"
type=PATH msg=audit(1152024317.140:105): item=0 name="/dev/urandom" inode=1640
dev=00:0f mode=020444 ouid=0 ogid=0 rdev=01:09
obj=system_u:object_r:urandom_device_t:s0
type=AVC msg=audit(1152024317.140:106): avc: denied { read } for pid=2973
comm="xfs" name="random" dev=tmpfs ino=1634 scontext=root:system_r:xfs_t:s0
tcontext=system_u:object_r:random_device_t:s0 tclass=chr_file
type=SYSCALL msg=audit(1152024317.140:106): arch=40000003 syscall=5 success=no
exit=-13 a0=a2cc72 a1=900 a2=108 a3=bf814f34 items=1 pid=2973 auid=0 uid=0
gid=43 euid=0 suid=0 fsuid=0 egid=43 sgid=43 fsgid=43 tty=(none) comm="xfs"
exe="/usr/bin/xfs" subj=root:system_r:xfs_t:s0
type=CWD msg=audit(1152024317.140:106): cwd="/"
type=PATH msg=audit(1152024317.140:106): item=0 name="/dev/random" inode=1634
dev=00:0f mode=020666 ouid=0 ogid=0 rdev=01:08
obj=system_u:object_r:random_device_t:s0
The bug seems to be fixed in selinux-policy-targeted-2.3.3-8.fc5. Thanks. |