Bug 2083354
| Summary: | SELinux is preventing gdb from 'open' accesses on the chr_file /dev/dri/renderD128. | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Davide Repetto <red> |
| Component: | selinux-policy | Assignee: | Zdenek Pytela <zpytela> |
| Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 36 | CC: | dwalsh, grepl.miroslav, lvrabec, mmalik, omosnace, pkoncity, vmojzis, zpytela |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Unspecified | ||
| Whiteboard: | abrt_hash:bcad30ba77c7bea30e71f63184079863abaee2a179e0962faaf9cf8fdd4d5037;VARIANT_ID=matecompiz; | ||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2022-05-10 06:40:53 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
It is required to turn this boolean on to allow abrt execute its gdb handler and be able to troubleshoot further: # setsebool -P abrt_handle_event on and subsequently report another bug for the affected component. Refer to abrt_handle_event_selinux(8) for more information. *** This bug has been marked as a duplicate of bug 1896648 *** |
Description of problem: This AVC was caused by a crash of qemu. SELinux is preventing gdb from 'open' accesses on the chr_file /dev/dri/renderD128. ***** Plugin catchall (100. confidence) suggests ************************** Se ci credi gdb dovrebbe essere consentito open accesso al renderD128 chr_file per impostazione predefinita. Then si dovrebbe riportare il problema come bug. E' possibile generare un modulo di politica locale per consentire questo accesso. Do consentire questo accesso per ora eseguendo: # ausearch -c 'gdb' --raw | audit2allow -M my-$MODULE_NOME # semodule -X 300 -i miei-gdb.pp Additional Information: Source Context system_u:system_r:abrt_t:s0-s0:c0.c1023 Target Context system_u:object_r:dri_device_t:s0 Target Objects /dev/dri/renderD128 [ chr_file ] Source gdb Source Path gdb Port <Sconosciuto> Host (removed) Source RPM Packages Target RPM Packages SELinux Policy RPM selinux-policy-targeted-36.8-1.fc36.noarch Local Policy RPM selinux-policy-targeted-36.8-1.fc36.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 5.17.5-300.fc36.x86_64 #1 SMP PREEMPT Thu Apr 28 15:51:30 UTC 2022 x86_64 x86_64 Alert Count 1 First Seen 2022-05-09 20:07:35 CEST Last Seen 2022-05-09 20:07:35 CEST Local ID c555d394-4428-41c9-8e3a-7b995600857e Raw Audit Messages type=AVC msg=audit(1652119655.877:846): avc: denied { open } for pid=112564 comm="gdb" path="/dev/dri/renderD128" dev="devtmpfs" ino=560 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dri_device_t:s0 tclass=chr_file permissive=1 Hash: gdb,abrt_t,dri_device_t,chr_file,open Version-Release number of selected component: selinux-policy-targeted-36.8-1.fc36.noarch Additional info: component: selinux-policy reporter: libreport-2.17.1 hashmarkername: setroubleshoot kernel: 5.17.5-300.fc36.x86_64 type: libreport Potential duplicate: bug 1903404