| Summary: | SELinux is preventing /usr/bin/gdb from using the 'signull' accesses on a process. | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Nicolas Mailhot <nicolas.mailhot> |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | rawhide | CC: | dominick.grift, dwalsh, mgrepl, mnowak, walters |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Unspecified | ||
| Whiteboard: | abrt_hash:f87635774396ddf6532031732e541bb6f170fbdbc3cf499c56d6d411c56f0af9 | ||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2012-12-15 19:10:26 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
I suppose that's abrt trying to run after a NetworkManager crash Why would NetworkManager be running gdb and send a signull to a process running as rpm_t? (packagekit?) I think that happened during a yum NetworkManager update But I agree things have been getting weirder and weirder lately (In reply to comment #2) > Why would NetworkManager be running gdb and send a signull to a process running > as rpm_t? (packagekit?) NetworkManager runs gdb on itself when it crashes in order to extract a crash dump. The code should just be removed since we have abrt. NM has some internal crashlogging logic that does attempt to run gdb and pipe its output to syslog on a crash, which has proven quite useful when diagnosing crashes. I suppose we can turn that off in Fedora if it's causing problems, though we've had this code enabled for almost 5 years and it hasn't had problems before. Dan well we have a new feature that is going to block processes from being able to ptrace other processes. Which will block NetworkManager from doing this. *** Bug 795376 has been marked as a duplicate of this bug. *** |
libreport version: 2.0.8 executable: /usr/bin/python hashmarkername: setroubleshoot kernel: 3.3.0-0.rc3.git5.1.fc17.x86_64 reason: SELinux is preventing /usr/bin/gdb from using the 'signull' accesses on a process. time: jeu. 16 févr. 2012 18:19:35 CET description: :SELinux is preventing /usr/bin/gdb from using the 'signull' accesses on a process. : :***** Plugin catchall (100. confidence) suggests *************************** : :If you believe that gdb should be allowed signull access on processes labeled rpm_t by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep gdb /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context system_u:system_r:NetworkManager_t:s0 :Target Context unconfined_u:system_r:rpm_t:s0-s0:c0.c1023 :Target Objects [ process ] :Source gdb :Source Path /usr/bin/gdb :Port <Inconnu> :Host (removed) :Source RPM Packages gdb-7.4.50.20120120-17.fc17.x86_64 :Target RPM Packages :Policy RPM selinux-policy-3.10.0-88.fc17.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Permissive :Host Name (removed) :Platform Linux (removed) 3.3.0-0.rc3.git5.1.fc17.x86_64 #1 : SMP Tue Feb 14 14:58:54 UTC 2012 x86_64 x86_64 :Alert Count 3 :First Seen jeu. 16 févr. 2012 08:00:23 CET :Last Seen jeu. 16 févr. 2012 18:18:06 CET :Local ID 4c8aee95-684c-4e49-b82a-e0924cc4092b : :Raw Audit Messages :type=AVC msg=audit(1329412686.229:10340): avc: denied { signull } for pid=29671 comm="gdb" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=unconfined_u:system_r:rpm_t:s0-s0:c0.c1023 tclass=process : : :type=SYSCALL msg=audit(1329412686.229:10340): arch=x86_64 syscall=kill success=yes exit=0 a0=73a3 a1=0 a2=73e7 a3=7fff8fa4e4c0 items=0 ppid=29670 pid=29671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=gdb exe=/usr/bin/gdb subj=system_u:system_r:NetworkManager_t:s0 key=(null) : :Hash: gdb,NetworkManager_t,rpm_t,process,signull : :audit2allowunable to open /sys/fs/selinux/policy: Permission denied : : :audit2allow -Runable to open /sys/fs/selinux/policy: Permission denied : :