Bug 2116494
Summary: | SELinux is preventing gdb from read access on the chr_file card0. | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | K Naraian <knaraian> |
Component: | selinux-policy | Assignee: | Zdenek Pytela <zpytela> |
Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 36 | CC: | aannoaanno, dwalsh, grepl.miroslav, lvrabec, mmalik, omosnace, pkoncity, remyabel, vmojzis, zpytela |
Target Milestone: | --- | Keywords: | Triaged |
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2022-09-30 11:09:40 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
K Naraian
2022-08-08 15:54:17 UTC
It is required to turn this boolean on to allow abrt execute its gdb handler and be able to troubleshoot further: # setsebool -P abrt_handle_event on and subsequently report another bug for the affected component. Refer to abrt_handle_event_selinux(8) for more information. We are currently discussing the option of having the boolean turned on by default. *** Bug 2120044 has been marked as a duplicate of this bug. *** *** Bug 2121374 has been marked as a duplicate of this bug. *** Here is the SELinux denials with details: ---- type=PROCTITLE msg=audit(09/05/2022 11:45:58.906:638) : proctitle=/usr/libexec/gdb --batch -ex python exec(open("/usr/libexec/abrt-gdb-exploitable").read()) -ex core-file ./coredump -ex abrt-exp type=PATH msg=audit(09/05/2022 11:45:58.906:638) : item=0 name=/dev/dri/card0 inode=296 dev=00:05 mode=character,660 ouid=root ogid=video rdev=e2:00 obj=system_u:object_r:dri_device_t:s0 nametype=NORMAL cap_fp=none cap_fi=none cap_fe=0 cap_fver=0 cap_frootid=0 type=CWD msg=audit(09/05/2022 11:45:58.906:638) : cwd=/var/spool/abrt/ccpp-2022-09-05-11:45:56.630619-2801 type=SYSCALL msg=audit(09/05/2022 11:45:58.906:638) : arch=x86_64 syscall=openat success=no exit=EACCES(Permission denied) a0=AT_FDCWD a1=0x55915b91ca70 a2=O_RDONLY|O_CLOEXEC a3=0x0 items=1 ppid=3935 pid=3936 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=gdb exe=/usr/libexec/gdb subj=system_u:system_r:abrt_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(09/05/2022 11:45:58.906:638) : avc: denied { read } for pid=3936 comm=gdb name=card0 dev="devtmpfs" ino=296 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:dri_device_t:s0 tclass=chr_file permissive=0 ---- # rpm -qa selinux\* selinux-policy-36.14-1.fc36.noarch selinux-policy-targeted-36.14-1.fc36.noarch selinux-policy-devel-36.14-1.fc36.noarch # Reproducible on my Fedora 36 VM after logging in as unconfined user from GDM which runs on Xorg. # abrt-cli info Id b5197ea Component gnome-shell Count 1 Time 2022-09-05 11:45:56 Command line /usr/bin/gnome-shell Package gnome-shell-42.4-1.fc36 User id 1000 (unconfined-user) Path /var/spool/abrt/ccpp-2022-09-05-11:45:56.630619-2801 # After enabling the abrt_handle_event boolean permanently, the SELinux denials are not reproducible anymore. It is required to turn this boolean on to allow abrt execute its gdb handler and be able to troubleshoot further: # setsebool -P abrt_handle_event on and subsequently report another bug for the affected component. Refer to abrt_handle_event_selinux(8) for more information. Closing as dup of bz#1896648. *** This bug has been marked as a duplicate of bug 1896648 *** |