Bug 726117

Summary: [abrt] (null): SELinux is preventing /usr/sbin/postdrop from 'getattr' accesses on the fifo_file fifo_file.
Product: Red Hat Enterprise Linux 6 Reporter: Michal Nowak <mnowak>
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED DUPLICATE QA Contact: BaseOS QE Security Team <qe-baseos-security>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 6.1CC: dwalsh, jmoskovc, mmalik, ohudlick
Target Milestone: rc   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard: abrt_hash:659f290cc8b31fa29fe8ce8203d37d93d256c81645f179da009d26696d065ba2
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-07-28 12:40:52 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Michal Nowak 2011-07-27 15:11:45 UTC
abrt version: 2.0.5
executable:     /usr/bin/python
hashmarkername: setroubleshoot
kernel:         2.6.32-171.el6.x86_64
reason:         SELinux is preventing /usr/sbin/postdrop from 'getattr' accesses on the fifo_file fifo_file.
time:           Wed Jul 27 17:11:06 2011

description:
:SELinux is preventing /usr/sbin/postdrop from 'getattr' accesses on the fifo_file fifo_file.
:
:*****  Plugin catchall (100. confidence) suggests  ***************************
:
:If you believe that postdrop should be allowed getattr access on the fifo_file fifo_file by default.
:Then you should report this as a bug.
:You can generate a local policy module to allow this access.
:Do
:allow this access for now by executing:
:# grep postdrop /var/log/audit/audit.log | audit2allow -M mypol
:# semodule -i mypol.pp
:
:Additional Information:
:Source Context                system_u:system_r:postfix_postdrop_t:s0-s0:c0.c102
:                              3
:Target Context                system_u:system_r:abrt_t:s0-s0:c0.c1023
:Target Objects                fifo_file [ fifo_file ]
:Source                        postdrop
:Source Path                   /usr/sbin/postdrop
:Port                          <Unknown>
:Host                          (removed)
:Source RPM Packages           postfix-2.6.6-3.el6
:Target RPM Packages           
:Policy RPM                    selinux-policy-3.7.19-104.el6
:Selinux Enabled               True
:Policy Type                   targeted
:Enforcing Mode                Enforcing
:Host Name                     (removed)
:Platform                      Linux dhcp-25-35.brq.redhat.com
:                              2.6.32-171.el6.x86_64 #1 SMP Thu Jul 21 23:23:33
:                              EDT 2011 x86_64 x86_64
:Alert Count                   1
:First Seen                    Wed 27 Jul 2011 04:49:53 PM CEST
:Last Seen                     Wed 27 Jul 2011 04:49:53 PM CEST
:Local ID                      c4815221-d9c6-4369-a7a4-6abe0848c51e
:
:Raw Audit Messages
:type=AVC msg=audit(1311778193.667:22): avc:  denied  { getattr } for  pid=31383 comm="postdrop" path="pipe:[201861]" dev=pipefs ino=201861 scontext=system_u:system_r:postfix_postdrop_t:s0-s0:c0.c1023 tcontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tclass=fifo_file
:
:
:type=SYSCALL msg=audit(1311778193.667:22): arch=x86_64 syscall=fstat success=no exit=EACCES a0=2 a1=7fff63470690 a2=7fff63470690 a3=7fff634703c0 items=0 ppid=31382 pid=31383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=90 sgid=90 fsgid=90 tty=(none) ses=4294967295 comm=postdrop exe=/usr/sbin/postdrop subj=system_u:system_r:postfix_postdrop_t:s0-s0:c0.c1023 key=(null)
:
:Hash: postdrop,postfix_postdrop_t,abrt_t,fifo_file,getattr
:
:audit2allow
:
:#============= postfix_postdrop_t ==============
:allow postfix_postdrop_t abrt_t:fifo_file getattr;
:
:audit2allow -R
:
:#============= postfix_postdrop_t ==============
:allow postfix_postdrop_t abrt_t:fifo_file getattr;
:

Comment 2 Miroslav Grepl 2011-07-28 05:36:26 UTC
Michal,
how did you get this?

Comment 3 Michal Nowak 2011-07-28 10:05:51 UTC
with abrt-2.0.4-1.el6.x86_64 and libreport-2.0.5-1.el6.x86_64 I prepared a crash via

  sleep 3m &
  kill -11 %1

and found SELinux AVC in /var/log/messages after abrtd processed the crash dir (no reporting involved).

Comment 4 Jiri Moskovcak 2011-07-28 12:24:52 UTC
I think this is dupe of #705768. In rhel6 there is by default enabled reporting to root@localhost, which is done by abrtd.

This is the line from abrt_event.conf responsible for it:

EVENT=post-create       reporter-mailx

- means: run reporter-mailx when a new crash is detected

Comment 5 Miroslav Grepl 2011-07-28 12:40:52 UTC
Yeap, I also think so.

*** This bug has been marked as a duplicate of bug 705768 ***