Bug 567665
| Summary: | SELinux is preventing /usr/libexec/nm-dhcp-client.action "getsched" access . | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Michal Schmidt <mschmidt> | ||||
| Component: | selinux-policy | Assignee: | Daniel Walsh <dwalsh> | ||||
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||
| Severity: | medium | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | 13 | CC: | dwalsh, emanwesk-2, mgrepl, tcameron, tc | ||||
| Target Milestone: | --- | Keywords: | Reopened | ||||
| Target Release: | --- | ||||||
| Hardware: | x86_64 | ||||||
| OS: | Linux | ||||||
| Whiteboard: | setroubleshoot_trace_hash:aa30c7ee6822842f456e8d9505a95cfa35f86971ac2568fa434d54552a943f75 | ||||||
| Fixed In Version: | selinux-policy-3.6.32-92.fc12 | Doc Type: | Bug Fix | ||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2010-03-08 11:16:42 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Attachments: |
|
||||||
|
Description
Michal Schmidt
2010-02-23 15:36:23 UTC
Fixed in selinux-policy-3.7.10-2.fc13.noarch selinux-policy-3.7.10-2.fc13 has been submitted as an update for Fedora 13. http://admin.fedoraproject.org/updates/F13/FEDORA-2010-2622 selinux-policy-3.6.32-92.fc12 has been submitted as an update for Fedora 12. http://admin.fedoraproject.org/updates/selinux-policy-3.6.32-92.fc12 selinux-policy-3.7.10-3.fc13 has been submitted as an update for Fedora 13. http://admin.fedoraproject.org/updates/F13/FEDORA-2010-2622 selinux-policy-3.7.10-3.fc13 has been pushed to the Fedora 13 stable repository. If problems still persist, please make note of it in this bug report. Daniel I can repro this one with selinux-policy-3.7.10-3.fc13.noarch. If selinux is in enforcing targeted, this precludes eth0 eth1 and so on from connecting to my LAN. I have to setenforce 0 to get online. Ray are you sure you are getting the same AVC?
ausearch -m avc -ts recent
rpm -q selinux-policy
selinux-policy-3.7.10-3.fc13.noarch
sesearch -A -s dhcpc_t -p getsched
Found 1 semantic av rules:
allow dhcpc_t dhcpc_t : process { fork sigchld sigkill sigstop signull signal ptrace getsched getcap setcap setfscreate } ;
selinux-policy-3.7.10-4.fc13.noarch
time->Thu Feb 25 23:30:10 2010
type=SYSCALL msg=audit(1267137010.324:18011): arch=c000003e syscall=143 success=yes exit=0 a0=831 a1=7f98ee681d38 a2=7ffffbd03fe0 a3=1 items=0 ppid=1 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="plymouthd" exe="/sbin/plymouthd" subj=system_u:system_r:plymouthd_t:s0 key=(null)
type=AVC msg=audit(1267137010.324:18011): avc: denied { getsched } for pid=2097 comm="plymouthd" scontext=system_u:system_r:plymouthd_t:s0 tcontext=system_u:system_r:plymouthd_t:s0 tclass=process
----
time->Thu Feb 25 23:31:26 2010
type=SYSCALL msg=audit(1267137086.910:5): arch=c000003e syscall=143 success=yes exit=0 a0=505 a1=7f1048ca2d38 a2=7fff8d8e5a70 a3=1 items=0 ppid=1283 pid=1285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modem-manager" exe="/usr/sbin/modem-manager" subj=system_u:system_r:modemmanager_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1267137086.910:5): avc: denied { getsched } for pid=1285 comm="modem-manager" scontext=system_u:system_r:modemmanager_t:s0-s0:c0.c1023 tcontext=system_u:system_r:modemmanager_t:s0-s0:c0.c1023 tclass=process
----
time->Thu Feb 25 23:32:22 2010
type=SYSCALL msg=audit(1267137142.824:14): arch=c000003e syscall=143 success=yes exit=0 a0=727 a1=7fa073c6dd38 a2=7fffe415a2e0 a3=7fffe415a1e0 items=0 ppid=1824 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="nm-dhcp-client." exe="/usr/libexec/nm-dhcp-client.action" subj=system_u:system_r:dhcpc_t:s0 key=(null)
type=AVC msg=audit(1267137142.824:14): avc: denied { getsched } for pid=1831 comm="nm-dhcp-client." scontext=system_u:system_r:dhcpc_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=process
'sesearch -A -s dhcpc_t -p getsched' does not find anything here. Created attachment 396431 [details]
Output of requested commands.
Installed 3.7.10-4 now the leaked to /tmp/randomness reappears but at least my network (LAN-Ethernet) works again.
rpm -qa selinux*
selinux-policy-3.7.10-4.fc13.noarch
selinux-policy-targeted-3.7.10-4.fc13.noarch
[root@THOR jag]# ausearch -m avc -ts recent
----
time->Thu Feb 25 15:41:17 2010
type=SYSCALL msg=audit(1267141277.554:39): arch=c000003e syscall=59 success=yes exit=0 a0=178fb50 a1=178a550 a2=1789e30 a3=b8 items=0 ppid=2016 pid=2018 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm="semodule" exe="/usr/sbin/semodule" subj=unconfined_u:system_r:semanage_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1267141277.554:39): avc: denied { append } for pid=2018 comm="semodule" path="/tmp/tmpbeObVW" dev=sdb2 ino=9037 scontext=unconfined_u:system_r:semanage_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:rpm_tmp_t:s0 tclass=file
----
time->Thu Feb 25 15:41:20 2010
type=SYSCALL msg=audit(1267141280.389:41): arch=c000003e syscall=59 success=yes exit=0 a0=f54720 a1=f53e70 a2=f571e0 a3=8 items=0 ppid=2027 pid=2050 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm="restorecon" exe="/sbin/setfiles" subj=unconfined_u:system_r:setfiles_t:s0-s0:c0.c1023 key=(null)
type=AVC msg=audit(1267141280.389:41): avc: denied { read append } for pid=2050 comm="restorecon" path="/tmp/tmpbeObVW" dev=sdb2 ino=9037 scontext=unconfined_u:system_r:setfiles_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:rpm_tmp_t:s0 tclass=file
selinux-policy-3.6.32-92.fc12 has been pushed to the Fedora 12 testing repository. If problems still persist, please make note of it in this bug report. If you want to test the update, you can install it with su -c 'yum --enablerepo=updates-testing update selinux-policy'. You can provide feedback for this update here: http://admin.fedoraproject.org/updates/F12/FEDORA-2010-2953 Fedora Update System seems to have temporarily lost it's way. This is an F13 bug and it's suggesting an F12 update. Oops, my fault. I put this bug number to the bug list while I was creating new update for F12. The rpm_tmp_t append fix will be Fixed in selinux-policy-3.7.10-5.fc13.noarch selinux-policy-3.6.32-92.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report. I still get this denial regularly.
type=SYSCALL msg=audit(1267946601.582:19489): arch=c000003e syscall=143 success=yes exit=0 a0=777 a1=7fd0817b1d38 a2=7ffff5ed3c90 a3=7ffff5ed3b90 items=0 ppid=1909 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="nm-dhcp-client." exe="/usr/libexec/nm-dhcp-client.action" subj=system_u:system_r:dhcpc_t:s0 key=(null)
type=AVC msg=audit(1267946601.582:19489): avc: denied { getsched } for pid=1911 comm="nm-dhcp-client." scontext=system_u:system_r:dhcpc_t:s0 tcontext=system_u:system_r:dhcpc_t:s0 tclass=process
$ rpm -q NetworkManager ModemManager selinux-policy
NetworkManager-0.8.0-0.4.git20100211.fc13.x86_64
selinux-policy-3.7.11-1.fc13.noarch
# audit2allow -i /tmp/t
#============= dhcpc_t ==============
#!!!! This avc is allowed in the current policy
allow dhcpc_t self:process getsched;
Are you sure something did not go wrong on update.
# yum reinstall selinux-policy-targeted
Then execute
# sesearch -A -s dhcpc_t -p getsched
Found 1 semantic av rules:
allow dhcpc_t dhcpc_t : process { fork sigchld sigkill sigstop signull signal ptrace getsched getcap setcap setfscreate } ;
Dan, you're right. Something did go wrong during the update: libsepol.print_missing_requirements: icecream's global requirements were not met: type/attribute etcfile (No such file or directory). libsemanage.semanage_link_sandbox: Link packages failed (No such file or directory). semodule: Failed! After I removed the icecream package and then manually removed all traces of its SELinux parts (port definitions and a policy module), I was able to reinstall selinux-policy-targeted without errors and now sesearch is able to find the getsched rule. Closing this bug again, because the upgrade bug was a fault of the icecream package (which I maintain). |