Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
This project is now read‑only. Starting Monday, February 2, please use https://ibm-ceph.atlassian.net/ for all bug tracking management.

Bug 1493750

Summary: [RHCeph 3.0 / 12.2.0-2.el7cp] avc: denied { getattr } for pid=23270 comm="ceph-osd" path="/sys/dev/block/8:17" dev="sysfs"
Product: [Red Hat Storage] Red Hat Ceph Storage Reporter: Vasu Kulkarni <vakulkar>
Component: BuildAssignee: Boris Ranto <branto>
Status: CLOSED ERRATA QA Contact: Vasu Kulkarni <vakulkar>
Severity: high Docs Contact:
Priority: high    
Version: 3.0CC: gmeno, hnallurv, kdreyer, vakulkar
Target Milestone: rc   
Target Release: 3.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: ceph-12.2.1-9.el7cp Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-12-05 23:44:17 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Vasu Kulkarni 2017-09-20 19:59:18 UTC
Description of problem:

I am seeing few AVC denied during smoke suite

2017-09-15T16:43:39.267 INFO:teuthology.orchestra.run.clara013.stdout:type=AVC msg=audit(1505507288.352:4787): avc:  denied  { getattr } for  pid=23270 comm="ceph-osd" path="/sys/dev/block/8:17" dev="sysfs" ino=35631 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file
2017-09-15T16:43:39.267 INFO:teuthology.orchestra.run.clara013.stdout:type=AVC msg=audit(1505507289.217:4819): avc:  denied  { getattr } for  pid=23542 comm="ceph-osd" path="/sys/dev/block/8:17" dev="sysfs" ino=35632 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file
2017-09-15T16:43:39.267 INFO:teuthology.orchestra.run.clara013.stdout:type=AVC msg=audit(1505507289.847:4827): avc:  denied  { getattr } for  pid=23708 comm="ceph-osd" path="/sys/dev/block/8:17" dev="sysfs" ino=35632 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file
2017-09-15T16:43:39.268 INFO:teuthology.orchestra.run.clara013.stdout:type=AVC msg=audit(1505507296.898:4866): avc:  denied  { getattr } for  pid=24586 comm="ceph-osd" path="/sys/dev/block/8:33" dev="sysfs" ino=41347 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file
2017-09-15T16:43:39.268 INFO:teuthology.orchestra.run.clara013.stdout:type=AVC msg=audit(1505507297.873:4895): avc:  denied  { getattr } for  pid=24853 comm="ceph-osd" path="/sys/dev/block/8:33" dev="sysfs" ino=41342 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file
2017-09-15T16:43:39.268 INFO:teuthology.orchestra.run.clara013.stdout:type=AVC msg=audit(1505507298.504:4903): avc:  denied  { getattr } for  pid=25000 comm="ceph-osd" path="/sys/dev/block/8:33" dev="sysfs" ino=41342 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file
2017-09-15T16:43:39.269 INFO:teuthology.orchestra.run.clara013.stdout:type=AVC msg=audit(1505507305.345:4932): avc:  denied  { getattr } for  pid=25721 comm="ceph-osd" path="/sys/dev/block/8:49" dev="sysfs" ino=41428 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file
2017-09-15T16:43:39.269 INFO:teuthology.orchestra.run.clara013.stdout:type=AVC msg=audit(1505507306.201:4963): avc:  denied  { getattr } for  pid=25986 comm="ceph-osd" path="/sys/dev/block/8:49" dev="sysfs" ino=41429 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file
2017-09-15T16:43:39.269 INFO:teuthology.orchestra.run.clara013.stdout:type=AVC msg=audit(1505507306.846:4971): avc:  denied  { getattr } for  pid=26137 comm="ceph-osd" path="/sys/dev/block/8:49" dev="sysfs" ino=41429 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file
2017-09-15T16:43:39.269 INFO:teuthology.orchestra.run.clara013.stdout:type=AVC msg=audit(1505507788.228:5329): avc:  denied  { getattr } for  pid=23708 comm="tp_fstore_op" path="/sys/dev/block/8:17" dev="sysfs" ino=35632 scontext=system_u:system_r:ceph_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=lnk_file

http://magna002.ceph.redhat.com/vasu-2017-09-15_13:47:25-smoke-luminous---basic-multi/273938/teuthology.log

Comment 2 Boris Ranto 2017-09-21 15:27:13 UTC
Upstream PR:

https://github.com/ceph/ceph/pull/17891

Comment 3 Vasu Kulkarni 2017-09-21 17:10:43 UTC
Boris,

Also I see this for mon on different test, can raise a different bz if required.

'type=AVC msg=audit(1505980440.508:11998): avc: denied { getattr } for pid=55974 comm="ceph-mon" path="/sys/dev/block/8:1" dev="sysfs" ino=64370 
scontext=system_u:system_r:ceph_t:s0

Comment 4 Vasu Kulkarni 2017-09-21 17:12:16 UTC
I see its for ceph_t in the PR so it should work.

Comment 5 Boris Ranto 2017-09-22 12:47:13 UTC
It looks like the same defect although I can't say for sure because you omitted tcontext and tclass in that avc denial.

Comment 6 Christina Meno 2017-09-25 17:59:54 UTC
Vasu would you please provide the detail Boris mentioned in c5?

cheers

Comment 7 Vasu Kulkarni 2017-09-25 18:22:22 UTC
Sorry missed it, the one for ceph-mon is here

https://paste.fedoraproject.org/paste/kRe0yOM~kt7VnjvnYIV4PA/raw

Comment 8 Boris Ranto 2017-09-26 15:05:39 UTC
Yeah, it is the same issue, a daemon with ceph_t context is trying to do getattr on sysfs lnk file. I am just wondering why this was not picked up by the upstream teuthology runs. :-/

The SELinux patch was merged upstream and is staged for inclusion in next luminous release. I can cherry-pick it downstream but afaik, we need a blocker flag for that at this point.

Comment 16 Vasu Kulkarni 2017-10-24 01:19:14 UTC
Verified in recent smoke suite 12.2.1-23.el7cp

Comment 19 errata-xmlrpc 2017-12-05 23:44:17 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2017:3387