Bug 627457
Summary: | SELinux is preventing /usr/libexec/gdm-session-worker "read write" access on .pam-systemd-lock. | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Pavel Stehule <pavel.stehule> |
Component: | systemd | Assignee: | Lennart Poettering <lpoetter> |
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | medium | Docs Contact: | |
Priority: | low | ||
Version: | 14 | CC: | dwalsh, lpoetter, metherid, mgrepl, mschmidt, notting, pavel.stehule, plautrba, tmraz |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i386 | ||
OS: | Linux | ||
Whiteboard: | setroubleshoot_trace_hash:ac9ba03c3660a5b767c937436f4e761bcfb2b6a6664ddcf457470971996ecd22 | ||
Fixed In Version: | initscripts-9.17-2.fc14 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2010-08-27 03:06:21 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Pavel Stehule
2010-08-26 05:32:17 UTC
This looks like a leaked file descriptor. Not sure if the bug is in systemd, pam cron or xdm. Who creates .pam-systemd-lock? I suppose pam_systemd does. /var/run/user should be owned by the systemd package and then we can add a label to allow pam auth executables to create content within that directory. Hmm, note that /var/run will sooner or later be mounted from tmpfs. I can add a ghosted ownership dir, but I am not sure this is all you need, Dan? The problem is multiple programs are going to be able to create/read/write the content of the directory. But each one controls their own /var/run content. So I don't want to have to allow every app that user pam_systemd to have full access to every other apps /var/run content. If the directory is going to be transient, we will need the directory created and labeled at boot time. mkdir /var/run/user restorecon /var/run/user Ghosting does no good since rpm will not put down the original label. In the case of this bug. cron was the first app to run pam_systemd so it created the directory and files with its labels. OK, so what about this: 1) I'll now add /var/run/user as %ghost dir to the systemd package, this should make things work properly for now 2) I'll also add mkdir /var/run/user and restorecon /var/run/user to our var-run.service which is supposed to be run after the /var/run dir is mounted from tmpdir. We currently don't enable this service on F14, but then it is clear how this will work eventually, and other distros who might already want to use this service will get things right. I am labeling it var_auth_t which all of the login domains should be able to write to. Fixed in selinux-policy-3.9.0-1.fc14 Urks, didn't see your comment on %ghost. I have now prepped a package without %ghost. systemd-8-3.fc14,initscripts-9.17-2.fc14 has been submitted as an update for Fedora 14. https://admin.fedoraproject.org/updates/systemd-8-3.fc14,initscripts-9.17-2.fc14 initscripts-9.17-2.fc14, systemd-8-3.fc14 has been pushed to the Fedora 14 stable repository. If problems still persist, please make note of it in this bug report. |