| Summary: | SELinux is preventing /var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu from 'search' accesses on the directory .X11-unix. | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Bruce Cowan <bruce> |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 15 | CC: | dwalsh, mgrepl, robertfarmer37 |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | setroubleshoot_trace_hash:19968cbf1466ad5aad82461b9fd6a7ad578dacd1ec098ea8b27648ef3fca3019 | ||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-10-07 14:15:36 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
This occurs if I press the "view graphics" button in boinc-manager for a SETI project.
Also causes the following:
SELinux is preventing /var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu from create access on the tcp_socket port None.
***** Plugin catchall (100. confidence) suggests ***************************
If you believe that setiathome-5.28.x86_64-pc-linux-gnu should be allowed create access on the port None tcp_socket by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep setiathome-5.28 /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context system_u:system_r:boinc_project_t:s0
Target Context system_u:system_r:boinc_project_t:s0
Target Objects port None [ tcp_socket ]
Source setiathome-5.28
Source Path /var/lib/boinc/projects/setiathome.berkeley.edu/se
tiathome-5.28.x86_64-pc-linux-gnu
Port <Unknown>
Host Shaggy
Source RPM Packages
Target RPM Packages
Policy RPM selinux-policy-3.9.16-23.fc15
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name Shaggy
Platform Linux Shaggy 2.6.38.5-24.fc15.x86_64 #1 SMP Fri
May 6 08:00:28 UTC 2011 x86_64 x86_64
Alert Count 1
First Seen Sat 14 May 2011 17:01:15 BST
Last Seen Sat 14 May 2011 17:01:15 BST
Local ID 9f5cfb4d-2b0f-44d7-8c4f-2e5abc1df49d
Raw Audit Messages
type=AVC msg=audit(1305388875.278:88): avc: denied { create } for pid=3520 comm="setiathome-5.28" scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:system_r:boinc_project_t:s0 tclass=tcp_socket
type=SYSCALL msg=audit(1305388875.278:88): arch=x86_64 syscall=socket success=no exit=EACCES a0=2 a1=1 a2=0 a3=0 items=0 ppid=3513 pid=3520 auid=4294967295 uid=492 gid=482 euid=492 suid=492 fsuid=492 egid=482 sgid=482 fsgid=482 tty=(none) ses=4294967295 comm=setiathome-5.28 exe=/var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu subj=system_u:system_r:boinc_project_t:s0 key=(null)
Hash: setiathome-5.28,boinc_project_t,boinc_project_t,tcp_socket,create
audit2allow
#============= boinc_project_t ==============
allow boinc_project_t self:tcp_socket create;
audit2allow -R
#============= boinc_project_t ==============
allow boinc_project_t self:tcp_socket create;
(In reply to comment #1) > This occurs if I press the "view graphics" button in boinc-manager for a SETI > project. > Does it work for you? No, the graphic doesn't appear. ok, execute # semanage permissive -a boinc_project_t and try to re-test it. Also give me output of # ausearch -m avc -ts recent (In reply to comment #4) > ok, execute > > # semanage permissive -a boinc_project_t > > and try to re-test it. Also give me output of Another AVC appears > # ausearch -m avc -ts recent ---- time->Thu May 19 19:11:44 2011 type=SYSCALL msg=audit(1305828704.775:69): arch=c000003e syscall=42 success=yes exit=0 a0=8 a1=7fff7246d640 a2=13 a3=0 items=0 ppid=1107 pid=3006 auid=4294967295 uid=492 gid=482 euid=492 suid=492 fsuid=492 egid=482 sgid=482 fsgid=482 tty=(none) ses=4294967295 comm="setiathome-5.28" exe="/var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu" subj=system_u:system_r:boinc_project_t:s0 key=(null) type=AVC msg=audit(1305828704.775:69): avc: denied { connectto } for pid=3006 comm="setiathome-5.28" path="/tmp/.X11-unix/X0" scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:system_r:xserver_t:s0-s0:c0.c1023 tclass=unix_stream_socket type=AVC msg=audit(1305828704.775:69): avc: denied { write } for pid=3006 comm="setiathome-5.28" name="X0" dev=dm-0 ino=131694 scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1305828704.775:69): avc: denied { search } for pid=3006 comm="setiathome-5.28" name=".X11-unix" dev=dm-0 ino=137613 scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir ---- time->Thu May 19 19:14:20 2011 type=SYSCALL msg=audit(1305828860.939:70): arch=c000003e syscall=42 success=yes exit=0 a0=9 a1=7fff45b65840 a2=13 a3=0 items=0 ppid=1107 pid=3067 auid=4294967295 uid=492 gid=482 euid=492 suid=492 fsuid=492 egid=482 sgid=482 fsgid=482 tty=(none) ses=4294967295 comm="setiathome-5.28" exe="/var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu" subj=system_u:system_r:boinc_project_t:s0 key=(null) type=AVC msg=audit(1305828860.939:70): avc: denied { connectto } for pid=3067 comm="setiathome-5.28" path="/tmp/.X11-unix/X0" scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:system_r:xserver_t:s0-s0:c0.c1023 tclass=unix_stream_socket type=AVC msg=audit(1305828860.939:70): avc: denied { write } for pid=3067 comm="setiathome-5.28" name="X0" dev=dm-0 ino=131694 scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1305828860.939:70): avc: denied { search } for pid=3067 comm="setiathome-5.28" name=".X11-unix" dev=dm-0 ino=137613 scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir ---- time->Thu May 19 19:18:15 2011 type=SYSCALL msg=audit(1305829095.927:73): arch=c000003e syscall=42 success=yes exit=0 a0=8 a1=7ffff602be70 a2=13 a3=0 items=0 ppid=1107 pid=3185 auid=4294967295 uid=492 gid=482 euid=492 suid=492 fsuid=492 egid=482 sgid=482 fsgid=482 tty=(none) ses=4294967295 comm="setiathome-5.28" exe="/var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu" subj=system_u:system_r:boinc_project_t:s0 key=(null) type=AVC msg=audit(1305829095.927:73): avc: denied { connectto } for pid=3185 comm="setiathome-5.28" path="/tmp/.X11-unix/X0" scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:system_r:xserver_t:s0-s0:c0.c1023 tclass=unix_stream_socket type=AVC msg=audit(1305829095.927:73): avc: denied { write } for pid=3185 comm="setiathome-5.28" name="X0" dev=dm-0 ino=131694 scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=sock_file type=AVC msg=audit(1305829095.927:73): avc: denied { search } for pid=3185 comm="setiathome-5.28" name=".X11-unix" dev=dm-0 ino=137613 scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir This is academic really, because the graphics don't work in any case. |
SELinux is preventing /var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu from 'search' accesses on the directory .X11-unix. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that setiathome-5.28.x86_64-pc-linux-gnu should be allowed search access on the .X11-unix directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep setiathome-5.28 /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:boinc_project_t:s0 Target Context system_u:object_r:xdm_tmp_t:s0 Target Objects .X11-unix [ dir ] Source setiathome-5.28 Source Path /var/lib/boinc/projects/setiathome.berkeley.edu/se tiathome-5.28.x86_64-pc-linux-gnu Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.9.16-23.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 2.6.38.5-24.fc15.x86_64 #1 SMP Fri May 6 08:00:28 UTC 2011 x86_64 x86_64 Alert Count 1 First Seen Sat 14 May 2011 17:01:15 BST Last Seen Sat 14 May 2011 17:01:15 BST Local ID 02beedf8-86b6-43bc-b7f5-d8f14f607d02 Raw Audit Messages type=AVC msg=audit(1305388875.277:86): avc: denied { search } for pid=3520 comm="setiathome-5.28" name=".X11-unix" dev=dm-0 ino=137613 scontext=system_u:system_r:boinc_project_t:s0 tcontext=system_u:object_r:xdm_tmp_t:s0 tclass=dir type=SYSCALL msg=audit(1305388875.277:86): arch=x86_64 syscall=connect success=no exit=EACCES a0=8 a1=7fffc7c00120 a2=13 a3=0 items=0 ppid=3513 pid=3520 auid=4294967295 uid=492 gid=482 euid=492 suid=492 fsuid=492 egid=482 sgid=482 fsgid=482 tty=(none) ses=4294967295 comm=setiathome-5.28 exe=/var/lib/boinc/projects/setiathome.berkeley.edu/setiathome-5.28.x86_64-pc-linux-gnu subj=system_u:system_r:boinc_project_t:s0 key=(null) Hash: setiathome-5.28,boinc_project_t,xdm_tmp_t,dir,search audit2allow #============= boinc_project_t ============== allow boinc_project_t xdm_tmp_t:dir search; audit2allow -R #============= boinc_project_t ============== allow boinc_project_t xdm_tmp_t:dir search;