| Summary: | SELinux is preventing /bin/systemd-tty-ask-password-agent from 'read' accesses on the fifo_file 136:0. | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | James Laska <jlaska> |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | 15 | CC: | adrigiga, bignikita, cmarcant, cyrusyzgtt, dan, dwalsh, elad, eric, ezzughayyar, frankly3d, galerienv, grinnz, jamescape777, jan, jcmj, jturner, luya, marco.guazzone, matt, mgrepl, millermichael, niki.guldbrand, pedrompcaetano, robk, sdunn2000, sedrez+bugzilla, skr, systpi, tadej.j, tsukinokage |
| Target Milestone: | --- | Keywords: | Reopened |
| Target Release: | --- | ||
| Hardware: | i386 | ||
| OS: | Linux | ||
| Whiteboard: | setroubleshoot_trace_hash:09ba32ed0e209446beb4418141f2175b0877e146642f3471f6a3e2eefe21afdd | ||
| Fixed In Version: | selinux-policy-3.9.16-32.fc15 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-07-08 18:10:32 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
Fixed in selinux-policy-3.9.16-17.fc15 selinux-policy-3.9.16-21.fc15 has been submitted as an update for Fedora 15. https://admin.fedoraproject.org/updates/selinux-policy-3.9.16-21.fc15 Package selinux-policy-3.9.16-21.fc15: * should fix your issue, * was pushed to the Fedora 15 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.9.16-21.fc15' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/selinux-policy-3.9.16-21.fc15 then log in and leave karma (feedback). selinux-policy-3.9.16-21.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report. I have the same/similar issue right after installing nscd. SELinux is preventing /bin/systemd-tty-ask-password-agent from read access on the fifo_file 136:3. Plugin: catchall you want to allow systemd-tty-ask-password-agent to have read access on the 136:3 fifo_fileIf you believe that systemd-tty-ask-password-agent should be allowed read access on the 136:3 fifo_file by default. You should report this as a bug. You can generate a local policy module to allow this access. Allow this access for now by executing: # grep systemd-tty-ask /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp And I have selinux-policy-3.9.16-23.fc15 installed. Niki what AVC are you seeing? Could you attach mypol.te I still have selinux-policiy-3.9.16-26.fc15 installed. I got an error when restarting avahi-daemon and the selinux alert browser linked the problem to this bug report. Something is not fixed, it appears. Please attach the AVC you are seeing ausearch -m avc -ts recent I run into the same problem and get the following AVC messages even with policy version 3.9.16-26:
SELinux is preventing /bin/systemd-tty-ask-password-agent from read access on the fifo_file 136:0.
***** Plugin catchall (100. confidence) suggests ***************************
If you believe that systemd-tty-ask-password-agent should be allowed read access on the 136:0 fifo_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep systemd-tty-ask /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context unconfined_u:system_r:systemd_passwd_agent_t:s0
Target Context unconfined_u:object_r:init_var_run_t:s0
Target Objects 136:0 [ fifo_file ]
Source systemd-tty-ask
Source Path /bin/systemd-tty-ask-password-agent
Port <Unknown>
Host (removed)
Source RPM Packages systemd-26-2.fc15
Target RPM Packages
Policy RPM selinux-policy-3.9.16-26.fc15
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name (removed)
Platform Linux vogon.seekline.net 2.6.38.7-30.fc15.x86_64
#1 SMP Fri May 27 05:15:53 UTC 2011 x86_64 x86_64
Alert Count 1
First Seen Mi 15 Jun 2011 21:18:43 CEST
Last Seen Mi 15 Jun 2011 21:18:43 CEST
Local ID d10a86c9-2161-4451-a201-6e12c937ef69
Raw Audit Messages
type=AVC msg=audit(1308165523.426:380): avc: denied { read } for pid=29356 comm="systemd-tty-ask" name="136:0" dev=tmpfs ino=33698 scontext=unconfined_u:system_r:systemd_passwd_agent_t:s0 tcontext=unconfined_u:object_r:init_var_run_t:s0 tclass=fifo_file
type=AVC msg=audit(1308165523.426:380): avc: denied { open } for pid=29356 comm="systemd-tty-ask" name="136:0" dev=tmpfs ino=33698 scontext=unconfined_u:system_r:systemd_passwd_agent_t:s0 tcontext=unconfined_u:object_r:init_var_run_t:s0 tclass=fifo_file
type=SYSCALL msg=audit(1308165523.426:380): arch=x86_64 syscall=open success=yes exit=ESRCH a0=1cb50a0 a1=80900 a2=fffffffffffffed0 a3=0 items=0 ppid=29355 pid=29356 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm=systemd-tty-ask exe=/bin/systemd-tty-ask-password-agent subj=unconfined_u:system_r:systemd_passwd_agent_t:s0 key=(null)
Hash: systemd-tty-ask,systemd_passwd_agent_t,init_var_run_t,fifo_file,read
audit2allow
#============= systemd_passwd_agent_t ==============
#!!!! This avc is allowed in the current policy
allow systemd_passwd_agent_t init_var_run_t:fifo_file { read open };
audit2allow -R
#============= systemd_passwd_agent_t ==============
#!!!! This avc is allowed in the current policy
allow systemd_passwd_agent_t init_var_run_t:fifo_file { read open };
If I follow the advice, create a local policy and load it, then no new AVCs are generated. The module looks as follows:
module mypol 1.0;
require {
type init_var_run_t;
type systemd_passwd_agent_t;
class fifo_file { read open };
}
#============= systemd_passwd_agent_t ==============
allow systemd_passwd_agent_t init_var_run_t:fifo_file { read open };
The file which systemd tries to access is the following:
/run/systemd/ask-password-block/136:0
HTH,
Stefan
I think I'm still seeing this as well. Here is my relevant info...
[root@linuxbook ~]# rpm -q selinux-policy
selinux-policy-3.9.16-26.fc15.noarch
[root@linuxbook ~]# ausearch -m avc -ts recent
----
time->Wed Jun 15 15:36:31 2011
type=SYSCALL msg=audit(1308166591.199:2873): arch=40000003 syscall=5 success=yes exit=3 a0=8a73080 a1=88900 a2=0 a3=bfd68874 items=0 ppid=29482 pid=29483 auid=32034 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts6 ses=1 comm="systemd-tty-ask" exe="/bin/systemd-tty-ask-password-agent" subj=unconfined_u:system_r:systemd_passwd_agent_t:s0 key=(null)
type=AVC msg=audit(1308166591.199:2873): avc: denied { open } for pid=29483 comm="systemd-tty-ask" name="136:6" dev=tmpfs ino=159679 scontext=unconfined_u:system_r:systemd_passwd_agent_t:s0 tcontext=unconfined_u:object_r:init_var_run_t:s0 tclass=fifo_file
type=AVC msg=audit(1308166591.199:2873): avc: denied { read } for pid=29483 comm="systemd-tty-ask" name="136:6" dev=tmpfs ino=159679 scontext=unconfined_u:system_r:systemd_passwd_agent_t:s0 tcontext=unconfined_u:object_r:init_var_run_t:s0 tclass=fifo_file
[root@linuxbook ~]#
Do you want some more information from this system?
Yes I allowed access to a sock_file not a fifo_file. Fixed in selinux-policy-3.9.16-30.fc15 selinux-policy-3.9.16-31.fc15 has been submitted as an update for Fedora 15. https://admin.fedoraproject.org/updates/selinux-policy-3.9.16-31.fc15 Package selinux-policy-3.9.16-32.fc15: * should fix your issue, * was pushed to the Fedora 15 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.9.16-32.fc15' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/selinux-policy-3.9.16-32.fc15 then log in and leave karma (feedback). selinux-policy-3.9.16-32.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report. I get this issue with Fedora 15 - selinux-policy 3.9.16-35.fc15.
I was attempting to stop the iscsi service using: service iscsid stop
More Info:
SELinux is preventing /bin/systemd-tty-ask-password-agent from read access on the fifo_file 136:0.
***** Plugin catchall (100. confidence) suggests ***************************
If you believe that systemd-tty-ask-password-agent should be allowed read access on the 136:0 fifo_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep systemd-tty-ask /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context unconfined_u:system_r:systemd_passwd_agent_t:s0
Target Context unconfined_u:object_r:init_var_run_t:s0
Target Objects 136:0 [ fifo_file ]
Source systemd-tty-ask
Source Path /bin/systemd-tty-ask-password-agent
Port <Unknown>
Host (removed)
Source RPM Packages systemd-26-8.fc15
Target RPM Packages
Policy RPM selinux-policy-3.9.16-35.fc15
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name (removed)
Platform Linux gb098531.gb.computacenter.co.uk
2.6.40-4.fc15.x86_64 #1 SMP Fri Jul 29 18:46:53
UTC 2011 x86_64 x86_64
Alert Count 1
First Seen Thu 04 Aug 2011 08:47:51 BST
Last Seen Thu 04 Aug 2011 08:47:51 BST
Local ID d1b34671-93d8-4962-b0fa-5a6cdc16da40
Raw Audit Messages
type=AVC msg=audit(1312444071.347:387): avc: denied { read } for pid=9212 comm="systemd-tty-ask" name="136:0" dev=tmpfs ino=100129 scontext=unconfined_u:system_r:systemd_passwd_agent_t:s0 tcontext=unconfined_u:object_r:init_var_run_t:s0 tclass=fifo_file
type=AVC msg=audit(1312444071.347:387): avc: denied { open } for pid=9212 comm="systemd-tty-ask" name="136:0" dev=tmpfs ino=100129 scontext=unconfined_u:system_r:systemd_passwd_agent_t:s0 tcontext=unconfined_u:object_r:init_var_run_t:s0 tclass=fifo_file
type=SYSCALL msg=audit(1312444071.347:387): arch=x86_64 syscall=open success=yes exit=ESRCH a0=10430a0 a1=80900 a2=fffffffffffffed0 a3=0 items=0 ppid=9211 pid=9212 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm=systemd-tty-ask exe=/bin/systemd-tty-ask-password-agent subj=unconfined_u:system_r:systemd_passwd_agent_t:s0 key=(null)
Hash: systemd-tty-ask,systemd_passwd_agent_t,init_var_run_t,fifo_file,read
audit2allow
#============= systemd_passwd_agent_t ==============
allow systemd_passwd_agent_t init_var_run_t:fifo_file { read open };
audit2allow -R
#============= systemd_passwd_agent_t ==============
allow systemd_passwd_agent_t init_var_run_t:fifo_file { read open };
My reading of the selinux-policy-3.9.16-36.fc15.src.rpm source shows this as allowed. Could you make sure nothing went wrong on your policy update yum reinstall selinux-policy Thanks for the response Daniel. After reinstalling selinux-policy I cannot reproduce the error. Matt Got this issue on a fresh install of Fedora 15 x86_64 with selinux-policy-3.9.16-39.fc15.noarch when running service hddtemp start Could you try it with the latest releae # yum update selinux-policy-targeted --enablerepo=updates-testing |
SELinux is preventing /bin/systemd-tty-ask-password-agent from 'read' accesses on the fifo_file 136:0. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that systemd-tty-ask-password-agent should be allowed read access on the 136:0 fifo_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep systemd-tty-ask /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:system_r:systemd_passwd_agent_t:s0 Target Context unconfined_u:object_r:init_var_run_t:s0 Target Objects 136:0 [ fifo_file ] Source systemd-tty-ask Source Path /bin/systemd-tty-ask-password-agent Port <Unknown> Host (removed) Source RPM Packages systemd-25-1.fc15 Target RPM Packages Policy RPM selinux-policy-3.9.16-15.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 2.6.38.3-18.fc15.i686.PAE #1 SMP Fri Apr 22 13:30:58 UTC 2011 i686 i686 Alert Count 1 First Seen Mon 25 Apr 2011 02:25:52 PM EDT Last Seen Mon 25 Apr 2011 02:25:52 PM EDT Local ID e532d015-a9dc-4dc5-9e61-59bedb82c605 Raw Audit Messages type=AVC msg=audit(1303755952.813:48): avc: denied { read } for pid=1879 comm="systemd-tty-ask" name="136:0" dev=tmpfs ino=24411 scontext=unconfined_u:system_r:systemd_passwd_agent_t:s0 tcontext=unconfined_u:object_r:init_var_run_t:s0 tclass=fifo_file type=AVC msg=audit(1303755952.813:48): avc: denied { open } for pid=1879 comm="systemd-tty-ask" name="136:0" dev=tmpfs ino=24411 scontext=unconfined_u:system_r:systemd_passwd_agent_t:s0 tcontext=unconfined_u:object_r:init_var_run_t:s0 tclass=fifo_file type=SYSCALL msg=audit(1303755952.813:48): arch=i386 syscall=open success=yes exit=ESRCH a0=9984080 a1=80900 a2=8051d94 a3=bfc1ef44 items=0 ppid=1878 pid=1879 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm=systemd-tty-ask exe=/bin/systemd-tty-ask-password-agent subj=unconfined_u:system_r:systemd_passwd_agent_t:s0 key=(null) Hash: systemd-tty-ask,systemd_passwd_agent_t,init_var_run_t,fifo_file,read audit2allow #============= systemd_passwd_agent_t ============== allow systemd_passwd_agent_t init_var_run_t:fifo_file { read open }; audit2allow -R #============= systemd_passwd_agent_t ============== allow systemd_passwd_agent_t init_var_run_t:fifo_file { read open };