Bug 813790
Summary: | oddjob-mkhomedir fails to create home directory when SELinux enforcing | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Marko Myllynen <myllynen> |
Component: | selinux-policy-targeted | Assignee: | Miroslav Grepl <mgrepl> |
Status: | CLOSED ERRATA | QA Contact: | Ben Levenson <benl> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 17 | CC: | dwalsh, stefw |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | selinux-policy-3.10.0-118.fc17 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-04-25 04:59:50 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Marko Myllynen
2012-04-18 12:45:07 UTC
Also ran into this when using Active Directory. Three alerts. Running 'restorecon' on the relevant directories showed nothing. ALERT 1: SELinux is preventing /usr/sbin/oddjobd from read access on the file /etc/passwd. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that oddjobd should be allowed read access on the passwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep oddjobd /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:oddjob_t:s0-s0:c0.c1023 Target Context system_u:object_r:passwd_file_t:s0 Target Objects /etc/passwd [ file ] Source oddjobd Source Path /usr/sbin/oddjobd Port <Unknown> Host stef-desktop.thewalter.lan Source RPM Packages oddjob-0.31.1-2.fc17.x86_64 Target RPM Packages setup-2.8.48-1.fc17.noarch Policy RPM selinux-policy-3.10.0-110.fc17.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name stef-desktop.thewalter.lan Platform Linux stef-desktop.thewalter.lan 3.3.1-5.fc17.x86_64 #1 SMP Tue Apr 10 20:42:28 UTC 2012 x86_64 x86_64 Alert Count 1 First Seen Fri 20 Apr 2012 05:10:30 PM CEST Last Seen Fri 20 Apr 2012 05:10:30 PM CEST Local ID f7bf2783-d607-4a88-939d-879380e53d07 Raw Audit Messages type=AVC msg=audit(1334934630.835:1429): avc: denied { read } for pid=15305 comm="oddjobd" name="passwd" dev="sda1" ino=178678 scontext=system_u:system_r:oddjob_t:s0-s0:c0.c1023 tcontext=system_u:object_r:passwd_file_t:s0 tclass=file type=SYSCALL msg=audit(1334934630.835:1429): arch=x86_64 syscall=open success=no exit=EACCES a0=7f8a5f2996ca a1=80000 a2=1b6 a3=238 items=0 ppid=1 pid=15305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=oddjobd exe=/usr/sbin/oddjobd subj=system_u:system_r:oddjob_t:s0-s0:c0.c1023 key=(null) Hash: oddjobd,oddjob_t,passwd_file_t,file,read audit2allowunable to open /sys/fs/selinux/policy: Permission denied audit2allow -Runable to open /sys/fs/selinux/policy: Permission denied ALERT 2: SELinux is preventing /usr/sbin/oddjobd from search access on the directory /var/lib/sss. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that oddjobd should be allowed search access on the sss directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep oddjobd /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:oddjob_t:s0-s0:c0.c1023 Target Context system_u:object_r:sssd_var_lib_t:s0 Target Objects /var/lib/sss [ dir ] Source oddjobd Source Path /usr/sbin/oddjobd Port <Unknown> Host stef-desktop.thewalter.lan Source RPM Packages oddjob-0.31.1-2.fc17.x86_64 Target RPM Packages sssd-1.8.2-10.fc17.x86_64 Policy RPM selinux-policy-3.10.0-110.fc17.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name stef-desktop.thewalter.lan Platform Linux stef-desktop.thewalter.lan 3.3.1-5.fc17.x86_64 #1 SMP Tue Apr 10 20:42:28 UTC 2012 x86_64 x86_64 Alert Count 1 First Seen Fri 20 Apr 2012 05:10:30 PM CEST Last Seen Fri 20 Apr 2012 05:10:30 PM CEST Local ID fcde642a-9ddc-49fe-adfc-407030067fa5 Raw Audit Messages type=AVC msg=audit(1334934630.835:1430): avc: denied { search } for pid=15305 comm="oddjobd" name="sss" dev="sda1" ino=20905 scontext=system_u:system_r:oddjob_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sssd_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1334934630.835:1430): arch=x86_64 syscall=connect success=no exit=EACCES a0=4 a1=7fffc4d1c5a0 a2=6e a3=238 items=0 ppid=1 pid=15305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=oddjobd exe=/usr/sbin/oddjobd subj=system_u:system_r:oddjob_t:s0-s0:c0.c1023 key=(null) Hash: oddjobd,oddjob_t,sssd_var_lib_t,dir,search audit2allowunable to open /sys/fs/selinux/policy: Permission denied audit2allow -Runable to open /sys/fs/selinux/policy: Permission denied ALERT 3: SELinux is preventing /usr/sbin/oddjobd from getattr access on the directory /run/winbindd. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that oddjobd should be allowed getattr access on the winbindd directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep oddjobd /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:oddjob_t:s0-s0:c0.c1023 Target Context unconfined_u:object_r:winbind_var_run_t:s0 Target Objects /run/winbindd [ dir ] Source oddjobd Source Path /usr/sbin/oddjobd Port <Unknown> Host stef-desktop.thewalter.lan Source RPM Packages oddjob-0.31.1-2.fc17.x86_64 Target RPM Packages samba-winbind-3.6.4-82.fc17.1.x86_64 Policy RPM selinux-policy-3.10.0-110.fc17.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name stef-desktop.thewalter.lan Platform Linux stef-desktop.thewalter.lan 3.3.1-5.fc17.x86_64 #1 SMP Tue Apr 10 20:42:28 UTC 2012 x86_64 x86_64 Alert Count 1 First Seen Fri 20 Apr 2012 05:10:30 PM CEST Last Seen Fri 20 Apr 2012 05:10:30 PM CEST Local ID 468c34b7-8a26-4b0b-9faa-378fb9370c64 Raw Audit Messages type=AVC msg=audit(1334934630.836:1431): avc: denied { getattr } for pid=15305 comm="oddjobd" path="/run/winbindd" dev="tmpfs" ino=13334221 scontext=system_u:system_r:oddjob_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:winbind_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1334934630.836:1431): arch=x86_64 syscall=lstat success=no exit=EACCES a0=7f8a5ee81aac a1=7fffc4d19e60 a2=7fffc4d19e60 a3=238 items=0 ppid=1 pid=15305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=oddjobd exe=/usr/sbin/oddjobd subj=system_u:system_r:oddjob_t:s0-s0:c0.c1023 key=(null) Hash: oddjobd,oddjob_t,winbind_var_run_t,dir,getattr audit2allowunable to open /sys/fs/selinux/policy: Permission denied audit2allow -Runable to open /sys/fs/selinux/policy: Permission denied Fixed in selinux-policy-3.10.0-117.fc17.noarch selinux-policy-3.10.0-117.fc17 has been submitted as an update for Fedora 17. https://admin.fedoraproject.org/updates/selinux-policy-3.10.0-117.fc17 Confirmed, selinux-policy-3.10.0-117.fc17.noarch fixes the issue. Thanks! Thanks for testing. Could you give karma. Gave karma already. selinux-policy-3.10.0-118.fc17 has been submitted as an update for Fedora 17. https://admin.fedoraproject.org/updates/selinux-policy-3.10.0-118.fc17 Package selinux-policy-3.10.0-118.fc17: * should fix your issue, * was pushed to the Fedora 17 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.10.0-118.fc17' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2012-6452/selinux-policy-3.10.0-118.fc17 then log in and leave karma (feedback). selinux-policy-3.10.0-118.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report. |