Bug 437786

Summary: [RHEL5 U2] SELinux AVC Denied message, After upgrading from U1
Product: Red Hat Enterprise Linux 5 Reporter: Jeff Burke <jburke>
Component: selinux-policyAssignee: Daniel Walsh <dwalsh>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: low    
Version: 5.2   
Target Milestone: rc   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-03-17 14:41:18 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Jeff Burke 2008-03-17 14:04:20 UTC
Description of problem:
 I upgraded my desktop system from RHEL5.U1 to RHEL5.2-Client-20080313.0. After
upgrading I rebooted and the system gets AVC Denied while booting.

Version-Release number of selected component (if applicable):
 libselinux-devel-1.33.4-5.el5
 libselinux-1.33.4-5.el5
 libselinux-python-1.33.4-5.el5
 selinux-policy-2.4.6-125.el5
 selinux-policy-targeted-2.4.6-125.el5

How reproducible:
 Always

Actual results:
Mar 17 09:19:37 barron kernel: audit(1205759975.999:4): avc:  denied  { search }
for  pid=2408 comm="rpc.statd" name="yp" dev=dm-0 ino=12025900
scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:object_r:var_yp_t:s0
tclass=dir
Mar 17 09:19:37 barron kernel: audit(1205759976.014:5): avc:  denied  { search }
for  pid=2408 comm="rpc.statd" name="yp" dev=dm-0 ino=12025900
scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:object_r:var_yp_t:s0
tclass=dir
Mar 17 09:19:37 barron kernel: audit(1205759976.041:6): avc:  denied  { search }
for  pid=2408 comm="rpc.statd" name="yp" dev=dm-0 ino=12025900
scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:object_r:var_yp_t:s0
tclass=dir
Mar 17 09:19:37 barron kernel: audit(1205759976.043:7): avc:  denied  { search }
for  pid=2408 comm="rpc.statd" name="yp" dev=dm-0 ino=12025900
scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:object_r:var_yp_t:s0
tclass=dir
Mar 17 09:19:37 barron kernel: audit(1205759976.044:8): avc:  denied  { search }
for  pid=2408 comm="rpc.statd" name="yp" dev=dm-0 ino=12025900
scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:object_r:var_yp_t:s0
tclass=dir
Mar 17 09:19:37 barron kernel: audit(1205759976.320:9): avc:  denied  { search }
for  pid=2463 comm="dbus-daemon" name="yp" dev=dm-0 ino=12025900
scontext=system_u:system_r:system_dbusd_t:s0
tcontext=system_u:object_r:var_yp_t:s0 tclass=dir
Mar 17 09:19:37 barron kernel: audit(1205759976.320:10): avc:  denied  {
node_bind } for  pid=2463 comm="dbus-daemon"
scontext=system_u:system_r:system_dbusd_t:s0
tcontext=system_u:object_r:inaddr_any_node_t:s0 tclass=tcp_socket
Mar 17 09:19:37 barron kernel: audit(1205759976.320:11): avc:  denied  {
name_bind } for  pid=2463 comm="dbus-daemon" src=943
scontext=system_u:system_r:system_dbusd_t:s0
tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket
Mar 17 09:19:37 barron kernel: audit(1205759976.320:12): avc:  denied  {
name_connect } for  pid=2463 comm="dbus-daemon" dest=111
scontext=system_u:system_r:system_dbusd_t:s0
tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket
Mar 17 09:19:37 barron kernel: audit(1205759976.321:13): avc:  denied  { search
} for  pid=2463 comm="dbus-daemon" name="yp" dev=dm-0 ino=12025900
scontext=system_u:system_r:system_dbusd_t:s0
tcontext=system_u:object_r:var_yp_t:s0 tclass=dir

Expected results:
 System should not get avc denied messages under normal boot

Additional info:

Comment 1 Daniel Walsh 2008-03-17 14:41:18 UTC
You are using ypbind so you need to turn on the allow_ypbind boolean.

setsebool -P allow_ypbind=1

Should fix this problem.