Bug 799591
Summary: | SELinux is preventing NetworkManager from 'read' access on the file /etc/sysctl.conf. | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Nicolas Mailhot <nicolas.mailhot> |
Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
Status: | CLOSED ERRATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 16 | CC: | 7andrew, aaron, agustin.ferrario, akees, a-komarov, aktigger99645, alexvillacislasso, alice_knoll_drouin, aloisiopf, andre.ocosta, antonbaklanov, antonio.montagnani, apispace, awilliam, bartleyemily, belegdol, bernabeborrero, bgodusky, bharadwajt10, bigslowfat, bkim31, brentrbrian, bruce, bugs.michael, bugzilla, bugzilla, camilo.ignacio, cesarb, charlietowsend, clivehoskin, cpuobsessed, dan, daniel-fedoauth, dan.mashal, daramas444, darrellwilliams, dave, deejay1, deusshc, devonjanitz, dominick.grift, dwalsh, eddie, elad, emrsdias, erasmo_eli, Fedlinux, fedora, genes1122, gerardo.jimenezmayor, ghherlin, halinux, henryju, hit_man2, hugocosta22, jarin.franek, jdh8, jdtortul, jfrieben, johnny.rengifo, jorg, jsmith.fedora, justafedorauser, justin, kalivodaroman, keith-hansford, kerhunet, ketsal, kkshethin, klement.sekera, k.mansour, kwizart, laurent.rineau__fedora, leotaveira, link81, linuxnow, lmacken, luca.botti, luigi.weismann, magdorn, marinelli.michele, mark, massi.ergosum, maumad, maycon.franca, mgrepl, mikhail.v.gavrilov, milan.kerslager, mirvana-dmitry, mitr, mnowak, mobrien_12, moicsgomz, ms, nathan, noelduffy, oaliaso, olivares14031, pal666, pascuaas, patrys, pedro.ermidamonteiro, pmuller, postawa, pschindl, PTrenholme, rafiii48, rebus, refuzer, rob.d.wills, robermm, roberto_francescon, ronaldcanete, sauravsengupta17, scampa.giovanni, scottt.tw, sergeygraf.rus, shivam.alang, simon.lewis, sivlemx, sjoerd, smconvey, spiette, spochybova, s.scheepens, stanley.king, stefw, stephen.girouard, studio, tadp, tchollingsworth, thececils.4ever, thomasvidal, tim, tom.georgoulias, tommaso.celli, tsukinokage, uckelman, ultima.ratio.regum69, utilitymail, villanueva_fito140, w1berry, weparo, whitefox, wlee, xaver, xurzwi2q1 |
Target Milestone: | --- | Keywords: | Reopened |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Unspecified | ||
Whiteboard: | abrt_hash:49eca6fbf6729d777526d53aace3670cb2cbfae661342a893a7ac1af6b2abf84 | ||
Fixed In Version: | selinux-policy-3.10.0-84.fc16 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-04-22 03:34:50 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Nicolas Mailhot
2012-03-03 09:29:21 UTC
commit c15c9a6e24aebb00db8f5ffeaa982e3162320d92 Author: Miroslav Grepl <mgrepl> Date: Mon Mar 5 11:14:24 2012 +0000 NM reads sysctl.conf Proposing as Final blocker, criterion "In most cases, there must be no SELinux 'AVC: denied' messages or abrt crash notifications on initial boot and subsequent login" - this happens just on connecting to the network. -- Fedora Bugzappers volunteer triage team https://fedoraproject.org/wiki/BugZappers also proposing as NTH for Beta, it would be nice to avoid getting seven billion reports of this from the Beta release. Miroslav / Dan, can you do an selinux-policy build which fixes this and submit it as an F17 update? Sure, I am going to do it today. selinux-policy-3.10.0-103.fc17 has been submitted as an update for Fedora 17. https://admin.fedoraproject.org/updates/selinux-policy-3.10.0-103.fc17 Package selinux-policy-3.10.0-104.fc17: * should fix your issue, * was pushed to the Fedora 17 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.10.0-104.fc17' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2012-4248/selinux-policy-3.10.0-104.fc17 then log in and leave karma (feedback). selinux-policy-3.10.0-104.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report. I'm hitting this on F16 as well. It has been backported to F16. I am going to do a new F16 update these days. Re-opening for F16. I'm hitting it too and it's two weeks since mgrepl said he'd do an update. -- Fedora Bugzappers volunteer triage team https://fedoraproject.org/wiki/BugZappers The is happening on Fc16 x86_64 since kde was upgraded to 4.8.2 and the kernel was updated to 3.3.2... It has been fixed. selinux-policy-3.10.0-84.fc16 has been submitted as an update for Fedora 16. https://admin.fedoraproject.org/updates/selinux-policy-3.10.0-84.fc16 Dropping 17 NTH and Blocker status/nominations, as the issue is fixed in 17 and was re-opened for 16. I just did a softwar update today and got this error when I connected to the internet via Android 4.0 Portable WiFi hotspot (Verizon Galaxy Nexus): SELinux is preventing NetworkManager from read access on the file /etc/sysctl.conf. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that NetworkManager should be allowed read access on the sysctl.conf file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep NetworkManager /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:NetworkManager_t:s0 Target Context system_u:object_r:system_conf_t:s0 Target Objects /etc/sysctl.conf [ file ] Source NetworkManager Source Path NetworkManager Port <Unknown> Host XXXXXXXXXXX Source RPM Packages Target RPM Packages initscripts-9.34.2-1.fc16.i686 Policy RPM selinux-policy-3.10.0-80.fc16.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name XXXXXXXXXXX Platform Linux XXXXXXXXXXX 3.3.2-1.fc16.i686.PAE #1 SMP Sat Apr 14 00:50:11 UTC 2012 i686 i686 Alert Count 6 First Seen Sat 21 Apr 2012 04:25:38 AM PDT Last Seen Sat 21 Apr 2012 02:13:32 PM PDT Local ID 1a9dcf65-36d6-4802-bf1c-7f46b40ab142 Raw Audit Messages type=AVC msg=audit(1335042812.142:50): avc: denied { read } for pid=800 comm="NetworkManager" name="sysctl.conf" dev="dm-1" ino=525142 scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:object_r:system_conf_t:s0 tclass=file Hash: NetworkManager,NetworkManager_t,system_conf_t,file,read audit2allow #============= NetworkManager_t ============== allow NetworkManager_t system_conf_t:file read; audit2allow -R #============= NetworkManager_t ============== allow NetworkManager_t system_conf_t:file read; selinux-policy-3.10.0-84.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report. Still causing this. I'll and it's not activating abrt for some reason. I'll post another bug SELinux is preventing /sbin/dhclient from read access on the file nm-dhclient-em1.conf. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that dhclient should be allowed read access on the nm-dhclient-em1.conf file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep dhclient /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:system_r:dhcpc_t:s0-s0:c0.c1023 Target Context unconfined_u:object_r:var_run_t:s0 Target Objects nm-dhclient-em1.conf [ file ] Source dhclient Source Path /sbin/dhclient Port <Unknown> Host tower Source RPM Packages dhclient-4.2.3-6.P2.fc16.x86_64 Target RPM Packages Policy RPM selinux-policy-3.10.0-84.fc16.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name tower Platform Linux tower 3.3.2-1.fc16.x86_64 #1 SMP Sat Apr 14 00:31:23 UTC 2012 x86_64 x86_64 Alert Count 6 First Seen Sat 21 Apr 2012 09:48:46 PM EDT Last Seen Sun 22 Apr 2012 10:19:27 AM EDT Local ID 32de1171-7287-4dc7-935b-2f21dd299f16 Raw Audit Messages type=AVC msg=audit(1335104367.301:317): avc: denied { read } for pid=23295 comm="dhclient" name="nm-dhclient-em1.conf" dev="tmpfs" ino=2523954 scontext=unconfined_u:system_r:dhcpc_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:var_run_t:s0 tclass=file type=SYSCALL msg=audit(1335104367.301:317): arch=x86_64 syscall=open success=no exit=EACCES a0=7fffd887a85f a1=80000 a2=7f84211e8320 a3=38 items=0 ppid=23283 pid=23295 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts3 ses=7 comm=dhclient exe=/sbin/dhclient subj=unconfined_u:system_r:dhcpc_t:s0-s0:c0.c1023 key=(null) Hash: dhclient,dhcpc_t,var_run_t,file,read audit2allow #============= dhcpc_t ============== allow dhcpc_t var_run_t:file read; audit2allow -R #============= dhcpc_t ============== allow dhcpc_t var_run_t:file read; For now just execute # restorecon -R -v /var/run/nm-dhclient* I added fixes to make sure these files are labeled correctly. Ok, it does require a reboot. I assumed just killing the programs running that and then rerunning the program would work. After finally giving up and rebooting it worked. Thanks. |