Bug 2074411

Summary: avc denied for comm="teamd" scontext=system_u:system_r:NetworkManager_t:s0
Product: Red Hat Enterprise Linux 8 Reporter: Hangbin Liu <haliu>
Component: selinux-policyAssignee: Zdenek Pytela <zpytela>
Status: CLOSED DUPLICATE QA Contact: BaseOS QE Security Team <qe-baseos-security>
Severity: high Docs Contact:
Priority: high    
Version: 8.7CC: lvrabec, mmalik, ssekidde
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-04-12 08:10:56 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Hangbin Liu 2022-04-12 08:02:22 UTC
Description of problem:
Got avc denied for teamd command when run kernel selftests. Here is the log from beaker job https://beaker.engineering.redhat.com/recipes/11770365#task142574425:

SELinux status:                 enabled
SELinuxfs mount:                /sys/fs/selinux
SELinux root directory:         /etc/selinux
Loaded policy name:             targeted
Current mode:                   enforcing
Mode from config file:          enforcing
Policy MLS status:              enabled
Policy deny_unknown status:     allowed
Memory protection checking:     actual (secure)
Max kernel policy version:      33
selinux-policy-3.14.3-95.el8.noarch
----
time->Mon Apr 11 06:24:48 2022
type=PROCTITLE msg=audit(1649672688.946:6500): proctitle=2F7573722F62696E2F7465616D64002D6B002D74006C616731
type=SYSCALL msg=audit(1649672688.946:6500): arch=c000003e syscall=62 success=no exit=-13 a0=14193 a1=f a2=0 a3=7f7dcbbb7ac0 items=0 ppid=17649 pid=82803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="teamd" exe="/usr/bin/teamd" subj=system_u:system_r:NetworkManager_t:s0 key=(null)
type=AVC msg=audit(1649672688.946:6500): avc:  denied  { signal } for  pid=82803 comm="teamd" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 tclass=process permissive=0

Comment 1 Milos Malik 2022-04-12 08:10:56 UTC
Based on the SELinux denial in comment#0, this bug is a duplicate of BZ#2074409.

*** This bug has been marked as a duplicate of bug 2074409 ***

Comment 2 Hangbin Liu 2022-04-12 09:01:28 UTC
(In reply to Milos Malik from comment #1)
> Based on the SELinux denial in comment#0, this bug is a duplicate of
> BZ#2074409.
> 
> *** This bug has been marked as a duplicate of bug 2074409 ***

oh, looks there is something wrong with my network and this bug was created twice...