Bug 714948

Summary: SELinux is preventing /sbin/setfiles "rlimitinh" access.
Product: [Fedora] Fedora Reporter: Yahia Qzwany <new2009.net>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED INSUFFICIENT_DATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: unspecified    
Version: rawhideCC: dominick.grift, dwalsh, mgrepl, new2009.net
Target Milestone: ---   
Target Release: ---   
Hardware: i386   
OS: Linux   
Whiteboard: setroubleshoot_trace_hash:63e746824a897038e31ce3883d2c958827c7e4910aa5b6a28115fe444c58cbdf
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-06-21 16:08:24 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Yahia Qzwany 2011-06-21 12:01:43 UTC
Summary:

SELinux is preventing /sbin/setfiles "rlimitinh" access.

Detailed Description:

[setfiles has a permissive type (semanage_t). This access was not denied.]

SELinux denied access requested by setfiles. It is not expected that this access
is required by setfiles and this access may signal an intrusion attempt. It is
also possible that the specific version or configuration of the application is
causing it to require additional access.

Allowing Access:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Please file a bug
report.

Additional Information:

Source Context                unconfined_u:unconfined_r:semanage_t:s0-s0:c0.c102
                              3
Target Context                unconfined_u:unconfined_r:setfiles_t:s0-s0:c0.c102
                              3
Target Objects                None [ process ]
Source                        setfiles
Source Path                   /sbin/setfiles
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           policycoreutils-2.0.74-4.fc12
Target RPM Packages           
Policy RPM                    selinux-policy-3.6.32-41.fc12
Selinux Enabled               True
Policy Type                   targeted
MLS Enabled                   True
Enforcing Mode                Enforcing
Plugin Name                   catchall
Host Name                     (removed)
Platform                      Linux (removed)
                              2.6.31.5-127.fc12.i686.PAE #1 SMP Sat Nov 7
                              21:25:57 EST 2009 i686 i686
Alert Count                   3
First Seen                    الثلاثاء 21 حزيران 2011  15:00:25
Last Seen                     الثلاثاء 21 حزيران 2011  15:00:25
Local ID                      8f9ecc38-d621-4e4b-baa6-dbe8c511269d
Line Numbers                  

Raw Audit Messages            

node=(removed) type=AVC msg=audit(1308657625.803:74): avc:  denied  { rlimitinh } for  pid=5715 comm="setfiles" scontext=unconfined_u:unconfined_r:semanage_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:setfiles_t:s0-s0:c0.c1023 tclass=process

node=(removed) type=AVC msg=audit(1308657625.803:74): avc:  denied  { siginh } for  pid=5715 comm="setfiles" scontext=unconfined_u:unconfined_r:semanage_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:setfiles_t:s0-s0:c0.c1023 tclass=process

node=(removed) type=AVC msg=audit(1308657625.803:74): avc:  denied  { noatsecure } for  pid=5715 comm="setfiles" scontext=unconfined_u:unconfined_r:semanage_t:s0-s0:c0.c1023 tcontext=unconfined_u:unconfined_r:setfiles_t:s0-s0:c0.c1023 tclass=process

node=(removed) type=SYSCALL msg=audit(1308657625.803:74): arch=40000003 syscall=11 success=yes exit=0 a0=2b3f778 a1=37bc940 a2=0 a3=0 items=0 ppid=5664 pid=5715 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=1 comm="setfiles" exe="/sbin/setfiles" subj=unconfined_u:unconfined_r:setfiles_t:s0-s0:c0.c1023 key=(null)



Hash String generated from  selinux-policy-3.6.32-41.fc12,catchall,setfiles,semanage_t,setfiles_t,process,rlimitinh
audit2allow suggests:

#============= semanage_t ==============
allow semanage_t setfiles_t:process { siginh rlimitinh noatsecure };

Comment 1 Miroslav Grepl 2011-06-21 16:08:24 UTC
You are reporting F12 bug on Rawhide.