Bug 976548
Summary: | SELinux is preventing /usr/bin/perl from 'write' accesses on the directory clamd.amavisd. | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | W Agtail <crash70> |
Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
Status: | CLOSED INSUFFICIENT_DATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 19 | CC: | crash70, dominick.grift, dwalsh, mgrepl |
Target Milestone: | --- | Keywords: | Reopened |
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Unspecified | ||
Whiteboard: | abrt_hash:09555deb488de3dd4c0149e03ed6431317d805ae3485d4656bfd1e3cdfa1996f | ||
Fixed In Version: | selinux-policy-3.12.1-57.fc19 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-07-30 20:29:42 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
*** Bug 976564 has been marked as a duplicate of this bug. *** Ok, I see the same problem. I am adding fixes. selinux-policy-3.12.1-57.fc19 has been submitted as an update for Fedora 19. https://admin.fedoraproject.org/updates/selinux-policy-3.12.1-57.fc19 Package selinux-policy-3.12.1-57.fc19: * should fix your issue, * was pushed to the Fedora 19 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.12.1-57.fc19' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2013-11846/selinux-policy-3.12.1-57.fc19 then log in and leave karma (feedback). i have applied the update and still see these messages:
Jun 30 19:57:49 f19 clamd.amavisd: Starting clamd.amavisd: LibClamAV Warning: RWX mapping denied: Can't allocate RWX Memory: Permission denied
Jun 30 19:57:49 f19 clamd.amavisd: LibClamAV Warning: Bytecode: disabling JIT because SELinux is preventing 'execmem' access.
Jun 30 19:57:49 f19 clamd.amavisd: Run 'setsebool -P clamd_use_jit on'.
Jun 30 19:57:49 f19 clamd.amavisd: [ OK ]
> setsebool -P clamd_use_jit on
libsemanage.dbase_llist_set: record not found in the database
libsemanage.dbase_llist_set: could not set record value
Could not change boolean clamd_use_jit
Could not change policy booleans
amavisd-snmp also fails to start with:
SELinux is preventing /usr/bin/perl from write access on the sock_file /var/agentx/master.
***** Plugin catchall_labels (83.8 confidence) suggests ********************
If you want to allow perl to have write access on the master sock_file
Then you need to change the label on /var/agentx/master
Do
# semanage fcontext -a -t FILE_TYPE '/var/agentx/master'
where FILE_TYPE is one of the following: abrt_var_run_t, antivirus_db_t, antivirus_log_t, antivirus_tmp_t, antivirus_var_run_t, avahi_var_run_t, dccifd_var_run_t, devlog_t, init_var_run_t, lsassd_var_socket_t, mysqld_var_run_t, nscd_var_run_t, nslcd_var_run_t, pcscd_var_run_t, setrans_var_run_t, snmpd_var_lib_t, spamd_var_run_t, sssd_var_lib_t, syslogd_var_run_t, systemd_passwd_var_run_t, winbind_var_run_t.
Then execute:
restorecon -v '/var/agentx/master'
***** Plugin catchall (17.1 confidence) suggests ***************************
If you believe that perl should be allowed write access on the master sock_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep amavisd-snmp-su /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context system_u:system_r:antivirus_t:s0
Target Context system_u:object_r:var_t:s0
Target Objects /var/agentx/master [ sock_file ]
Source amavisd-snmp-su
Source Path /usr/bin/perl
Port <Unknown>
Host f19
Source RPM Packages perl-5.16.3-265.fc19.x86_64
Target RPM Packages
Policy RPM selinux-policy-3.12.1-57.fc19.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name f19
Platform Linux f19 3.9.6-301.fc19.x86_64 #1 SMP
Mon Jun 17 14:26:26 UTC 2013 x86_64 x86_64
Alert Count 15992
First Seen 2013-06-28 01:07:43 BST
Last Seen 2013-06-30 20:04:01 BST
Local ID f21d4ed4-8301-4801-81ee-e34e9dbc74dc
Raw Audit Messages
type=AVC msg=audit(1372619041.679:45568): avc: denied { write } for pid=21537 comm="amavisd-snmp-su" name="master" dev="dm-8" ino=260100 scontext=system_u:system_r:antivirus_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=sock_file
type=SYSCALL msg=audit(1372619041.679:45568): arch=x86_64 syscall=connect success=no exit=EACCES a0=8 a1=7ffffb194360 a2=6e a3=0 items=0 ppid=1 pid=21537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm=amavisd-snmp-su exe=/usr/bin/perl subj=system_u:system_r:antivirus_t:s0 key=(null)
Hash: amavisd-snmp-su,antivirus_t,var_t,sock_file,write
What does # rpm -qf /var/agentx > ls -ldZ /var/agentx/ drwx------. root root system_u:object_r:var_t:s0 /var/agentx/ > ls -lZ /var/agentx/master srwxr-xr-x. root root system_u:object_r:var_t:s0 /var/agentx/master > rpm -qf /var/agentx/ file /var/agentx is not owned by any package > rpm -qf /var/agentx/master file /var/agentx/master is not owned by any package restorecon -R -v /var/agentx I ran restorecon -R -v /var/agentx and now have the following: ls -ldZ /var/agentx/; ls -lZ /var/agentx/master drwx------. root root system_u:object_r:snmpd_var_lib_t:s0 /var/agentx/ srwxr-xr-x. root root system_u:object_r:snmpd_var_lib_t:s0 /var/agentx/master and a different selinux error: SELinux is preventing /usr/bin/perl (deleted) from connectto access on the unix_stream_socket /var/agentx/master. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that perl (deleted) should be allowed connectto access on the master unix_stream_socket by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep amavisd-snmp-su /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:antivirus_t:s0 Target Context system_u:system_r:fsadm_t:s0 Target Objects /var/agentx/master [ unix_stream_socket ] Source amavisd-snmp-su Source Path /usr/bin/perl (deleted) Port <Unknown> Host f19 Source RPM Packages perl-5.16.3-265.fc19.x86_64 Target RPM Packages Policy RPM selinux-policy-3.12.1-57.fc19.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name f19 Platform Linux f19 3.9.6-301.fc19.x86_64 #1 SMP Mon Jun 17 14:26:26 UTC 2013 x86_64 x86_64 Alert Count 144 First Seen 2013-06-28 17:04:05 BST Last Seen 2013-07-02 16:25:10 BST Local ID e69f5777-d9b9-4d24-a444-ad76b0e27a47 Raw Audit Messages type=AVC msg=audit(1372778710.524:64412): avc: denied { connectto } for pid=3267 comm="amavisd-snmp-su" path="/var/agentx/master" scontext=system_u:system_r:antivirus_t:s0 tcontext=system_u:system_r:fsadm_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1372778710.524:64412): arch=x86_64 syscall=connect success=no exit=EACCES a0=8 a1=7fff3a0bbbf0 a2=6e a3=0 items=1 ppid=1 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm=amavisd-snmp-su exe=/usr/bin/perl subj=system_u:system_r:antivirus_t:s0 key=(null) type=PATH msg=audit(1372778710.524:64412): item=0 name=(null) inode=260100 dev=fd:08 mode=0140755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:snmpd_var_lib_t:s0 Hash: amavisd-snmp-su,antivirus_t,fsadm_t,unix_stream_socket,connectto selinux-policy-3.12.1-57.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. Re comment 9 above, I have installed selinux-policy as shown: > rpm -q selinux-policy selinux-policy-3.12.1-57.fc19.noarch starting amavisd-snmp producing the following: SELinux is preventing /usr/bin/perl (deleted) from connectto access on the unix_stream_socket /var/agentx/master. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that perl (deleted) should be allowed connectto access on the master unix_stream_socket by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep amavisd-snmp-su /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:antivirus_t:s0 Target Context system_u:system_r:fsadm_t:s0 Target Objects /var/agentx/master [ unix_stream_socket ] Source amavisd-snmp-su Source Path /usr/bin/perl (deleted) Port <Unknown> Host f19 Source RPM Packages perl-5.16.3-265.fc19.x86_64 Target RPM Packages Policy RPM selinux-policy-3.12.1-57.fc19.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name f19 Platform Linux f19 3.9.6-301.fc19.x86_64 #1 SMP Mon Jun 17 14:26:26 UTC 2013 x86_64 x86_64 Alert Count 251 First Seen 2013-06-28 17:04:05 BST Last Seen 2013-07-04 13:32:59 BST Local ID e69f5777-d9b9-4d24-a444-ad76b0e27a47 Raw Audit Messages type=AVC msg=audit(1372941179.123:73934): avc: denied { connectto } for pid=25728 comm="amavisd-snmp-su" path="/var/agentx/master" scontext=system_u:system_r:antivirus_t:s0 tcontext=system_u:system_r:fsadm_t:s0 tclass=unix_stream_socket type=SYSCALL msg=audit(1372941179.123:73934): arch=x86_64 syscall=connect success=no exit=EACCES a0=8 a1=7fffb5c2b0c0 a2=6e a3=0 items=1 ppid=1 pid=25728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm=amavisd-snmp-su exe=/usr/bin/perl subj=system_u:system_r:antivirus_t:s0 key=(null) type=PATH msg=audit(1372941179.123:73934): item=0 name=(null) inode=260100 dev=fd:08 mode=0140755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:snmpd_var_lib_t:s0 Hash: amavisd-snmp-su,antivirus_t,fsadm_t,unix_stream_socket,connectto What does # ps -efZ |grep fsadm I have reinstall Fedora 19 and am unable to reproduce this. |
Description of problem: This happened when attempting to start clamd.amavisd. Also, from the logs, clamd_use_jit does not exist: Jun 20 19:42:58 f19 systemd: Starting SYSV: The clamd server running for amavisd... Jun 20 19:43:03 f19 clamd.amavisd: Starting clamd.amavisd: LibClamAV Warning: RWX mapping denied: Can't allocate RWX Memory: Permission denied Jun 20 19:43:03 f19 clamd.amavisd: LibClamAV Warning: Bytecode: disabling JIT because SELinux is preventing 'execmem' access. Jun 20 19:43:03 f19 clamd.amavisd: Run 'setsebool -P clamd_use_jit on'. Jun 20 19:43:03 f19 dbus[950]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) Jun 20 19:43:03 f19 dbus-daemon: dbus[950]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper) Jun 20 19:43:03 f19 clamd.amavisd: [ OK ] Jun 20 19:43:03 f19 systemd: Started SYSV: The clamd server running for amavisd. Jun 20 19:43:04 f19 dbus[950]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' Jun 20 19:43:04 f19 dbus-daemon: dbus[950]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd' Jun 20 19:43:06 f19 setroubleshoot: SELinux is preventing /usr/bin/perl from write access on the directory clamd.amavisd. For complete SELinux messages. run sealert -l 3ffed360-feda-4cd4-a0ee-74dde4029547 > setsebool -P clamd_use_jit on libsemanage.dbase_llist_set: record not found in the database (No such file or directory). libsemanage.dbase_llist_set: could not set record value (No such file or directory). Could not change boolean clamd_use_jit Could not change policy booleans SELinux is preventing /usr/bin/perl from 'write' accesses on the directory clamd.amavisd. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that perl should be allowed write access on the clamd.amavisd directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep /usr/sbin/amavi /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:antivirus_t:s0 Target Context unconfined_u:object_r:var_run_t:s0 Target Objects clamd.amavisd [ dir ] Source /usr/sbin/amavi Source Path /usr/bin/perl Port <Unknown> Host (removed) Source RPM Packages clamav-server-0.97.8-2.fc19.x86_64 Target RPM Packages Policy RPM selinux-policy-3.12.1-52.fc19.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.9.6-301.fc19.x86_64 #1 SMP Mon Jun 17 14:26:26 UTC 2013 x86_64 x86_64 Alert Count 5 First Seen 2013-06-20 19:05:49 BST Last Seen 2013-06-20 19:43:03 BST Local ID 3ffed360-feda-4cd4-a0ee-74dde4029547 Raw Audit Messages type=AVC msg=audit(1371753783.648:8591): avc: denied { write } for pid=17826 comm="clamd" name="clamd.amavisd" dev="tmpfs" ino=6169992 scontext=system_u:system_r:antivirus_t:s0 tcontext=unconfined_u:object_r:var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1371753783.648:8591): arch=x86_64 syscall=open success=no exit=EACCES a0=1dca280 a1=241 a2=1b6 a3=1 items=0 ppid=17824 pid=17826 auid=4294967295 uid=389 gid=388 euid=389 suid=389 fsuid=389 egid=388 sgid=388 fsgid=388 ses=4294967295 tty=(none) comm=clamd exe=/usr/sbin/clamd subj=system_u:system_r:antivirus_t:s0 key=(null) Hash: /usr/sbin/amavi,antivirus_t,var_run_t,dir,write Additional info: reporter: libreport-2.1.5 hashmarkername: setroubleshoot kernel: 3.9.6-301.fc19.x86_64 type: libreport