Bug 574919

Summary: SELinux is preventing /sbin/reboot "execute" access on /sbin/shutdown.
Product: [Fedora] Fedora Reporter: Martin Naď <martin.nad89>
Component: selinux-policyAssignee: Daniel Walsh <dwalsh>
Status: CLOSED DUPLICATE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: low    
Version: 13CC: dwalsh, mgrepl
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard: setroubleshoot_trace_hash:c6ef5dc997db2a5ca0258936d0a4809cde720480ae753bdc73ca9048fb7ef9c6
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-03-19 06:35:12 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Martin Naď 2010-03-18 20:05:56 UTC
Souhrn:

SELinux is preventing /sbin/reboot "execute" access on /sbin/shutdown.

Podrobný popis:

SELinux denied access requested by poweroff. It is not expected that this access
is required by poweroff and this access may signal an intrusion attempt. It is
also possible that the specific version or configuration of the application is
causing it to require additional access.

Povolení přístupu:

You can generate a local policy module to allow this access - see FAQ
(http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug
report.

Další informace:

Kontext zdroje                system_u:system_r:xdm_t:s0-s0:c0.c1023
Kontext cíle                 system_u:object_r:shutdown_exec_t:s0
Objekty cíle                 /sbin/shutdown [ file ]
Zdroj                         reboot
Cesta zdroje                  /sbin/reboot
Port                          <Neznámé>
Počítač                    (removed)
RPM balíčky zdroje          upstart-0.6.5-3.fc13
RPM balíčky cíle           upstart-0.6.5-3.fc13
RPM politiky                  selinux-policy-3.7.14-3.fc13
Selinux povolen               True
Typ politiky                  targeted
Vynucovací režim            Enforcing
Název zásuvného modulu     catchall
Název počítače            (removed)
Platforma                     Linux localhost.localdomain 2.6.33-10.fc13.i686 #1
                              SMP Sun Mar 14 21:05:05 EDT 2010 i686 i686
Počet upozornění           2
Poprvé viděno               Út 16. březen 2010, 21:35:10 CET
Naposledy viděno             Čt 18. březen 2010, 07:14:31 CET
Místní ID                   817f93df-29d4-44ed-8793-42d643f4cbd6
Čísla řádků              

Původní zprávy auditu      

node=localhost.localdomain type=AVC msg=audit(1268892871.508:15783): avc:  denied  { execute } for  pid=19869 comm="poweroff" name="shutdown" dev=sda2 ino=33709 scontext=system_u:system_r:xdm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:shutdown_exec_t:s0 tclass=file

node=localhost.localdomain type=SYSCALL msg=audit(1268892871.508:15783): arch=40000003 syscall=11 success=no exit=-13 a0=804994c a1=bfa9c03c a2=bfa9c11c a3=2 items=0 ppid=1047 pid=19869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="poweroff" exe="/sbin/reboot" subj=system_u:system_r:xdm_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  catchall,reboot,xdm_t,shutdown_exec_t,file,execute
audit2allow suggests:

#============= xdm_t ==============
allow xdm_t shutdown_exec_t:file execute;

Comment 1 Miroslav Grepl 2010-03-19 06:35:12 UTC

*** This bug has been marked as a duplicate of bug 574138 ***