Bug 481706
Summary: | SELinux is preventing automount (automount_t) "signal" to <Unknown> (mount_t). | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | Paul Jaques <paul> |
Component: | selinux-policy | Assignee: | Daniel Walsh <dwalsh> |
Status: | CLOSED ERRATA | QA Contact: | BaseOS QE <qe-baseos-auto> |
Severity: | medium | Docs Contact: | |
Priority: | low | ||
Version: | 5.3 | CC: | mmalik, ohudlick |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2009-09-02 07:59:28 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Paul Jaques
2009-01-27 09:29:10 UTC
Pasted wrong info. Sorry! Below is correct alert Source RPM Packages: autofs-5.0.1-0.rc2.102 Target RPM Packages: Policy RPM: selinux-policy-2.4.6-203.el5 Selinux Enabled: True Policy Type: targeted MLS Enabled: True Enforcing Mode: Enforcing Plugin Name: catchall Host Name: pm1.kpo.kz Platform: Linux pm1.kpo.kz 2.6.18-128.el5 #1 SMP Wed Dec 17 11:41:38 EST 2008 x86_64 x86_64 Alert Count: 6 First Seen: Tue 27 Jan 2009 08:34:06 AM GMT Last Seen: Tue 27 Jan 2009 09:01:50 AM GMT Local ID: 8ad06ea6-9b23-442a-8852-f1ab1c0ed8d8 Line Numbers: Raw Audit Messages : host=pm1.kpo.kz type=AVC msg=audit(1233046910.39:71): avc: denied { signal } for pid=4260 comm="automount" scontext=system_u:system_r:automount_t:s0 tcontext=system_u:system_r:mount_t:s0 tclass=process host=pm1.kpo.kz type=SYSCALL msg=audit(1233046910.39:71): arch=c000003e syscall=62 success=no exit=-13 a0=10a5 a1=f a2=3 a3=0 items=0 ppid=1 pid=4260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="automount" exe="/usr/sbin/automount" subj=system_u:system_r:automount_t:s0 key=(null) Strange You can allow this for now. # audit2allow -M mypol -l -i /var/log/audit/audit.log # semodule -i mypol.pp Fixed in selinux-policy-2.4.6-205.el5 An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2009-1242.html |