RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1847221 - [RHEL8]: avc: denied { write } for pid=21161 comm="smbd" name="krb5_0.rcache2"
Summary: [RHEL8]: avc: denied { write } for pid=21161 comm="smbd" name="krb5_0.rcac...
Keywords:
Status: CLOSED DUPLICATE of bug 1848953
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: selinux-policy
Version: 8.3
Hardware: Unspecified
OS: Linux
medium
high
Target Milestone: rc
: 8.3
Assignee: Zdenek Pytela
QA Contact: Milos Malik
URL:
Whiteboard:
Depends On:
Blocks: 1842946
TreeView+ depends on / blocked
 
Reported: 2020-06-16 00:48 UTC by xiaoli feng
Modified: 2023-09-14 06:02 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-07-27 16:17:51 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description xiaoli feng 2020-06-16 00:48:18 UTC
Description of problem:
Install distro RHEL-8.3.0-20200609.1. Mount cifs with option sec=krb5. But it's failed because " avc:  denied  { write } for  pid=21161 comm="smbd" name="krb5_0.rcache2" dev="dm-0"". Turn off selinux, this issue is gone.

samba config:
# cat /etc/samba/smb.conf
[global]
    workgroup = RHTS
    realm = RHQE.COM
    server signing = auto
    kerberos method = system keytab

[cifs]
    path = /mnt/testarea/server
    writeable = yes

AVC log:
type=AVC msg=audit(1592268399.956:373): avc:  denied  { write } for  pid=22891 comm="smbd" name="krb5_0.rcache2" dev="dm-0" ino=101509595 scontext=system_u:system_r:smbd_t:s0 tcontext=system_u:object_r:kadmind_tmp_t:s0 tclass=file permissive=0
type=SYSCALL msg=audit(1592268399.956:373): arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=555f9e76d100 a2=20042 a3=180 items=0 ppid=22638 pid=22891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="smbd" exe="/usr/sbin/smbd" subj=system_u:system_r:smbd_t:s0 key=(null)ARCH=x86_64 SYSCALL=openat AUID="unset" UID="root" GID="root" EUID="root" SUID="root" FSUID="root" EGID="root" SGID="root" FSGID="root"
type=PROCTITLE msg=audit(1592268399.956:373): proctitle=2F7573722F7362696E2F736D6264002D2D666F726567726F756E64002D2D6E6F2D70726F636573732D67726F7570


Version-Release number of selected component (if applicable):

selinux-policy-3.14.3-44.el8.noarch 

How reproducible:
100%

Steps to Reproduce:
1. mount //$SERVER/cifs $MOUNTPOINT -o sec=krb5
2.
3.

Actual results:


Expected results:


Additional info:

Comment 1 Milos Malik 2020-06-16 06:31:09 UTC
I believe this bug is a duplicate of BZ#1841488.

Comment 2 Zdenek Pytela 2020-06-16 06:51:58 UTC
Please set the system into SELinux permissive mode to gather all possible subsequent denials:

  # setenforce 0
<reproduce>
  # ausearch -i -m avc,user_avc -ts recent

You created this bugzilla with the severity of Urgent. This means:

    catastrophic issues which severely impact the mission-critical operations of an organization. This may mean that the operational servers, development systems or customer applications are down or not functioning and no procedural workaround exists.

Please explain the impact so that we can act accordingly.

As an immediate workaround, turn on the samba_export_all_rw boolean:

  # setsebool -P samba_export_all_rw on

Comment 3 xiaoli feng 2020-06-22 08:38:04 UTC
(In reply to Zdenek Pytela from comment #2)
> Please set the system into SELinux permissive mode to gather all possible
> subsequent denials:
> 
>   # setenforce 0
> <reproduce>
>   # ausearch -i -m avc,user_avc -ts recent


# ausearch -i -m avc,user_avc -ts recent
----
type=USER_AVC msg=audit(06/22/2020 03:29:47.729:391) : pid=723 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc:  received setenforce notice (enforcing=1)  exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?' 
----
type=USER_AVC msg=audit(06/22/2020 03:30:01.467:393) : pid=723 uid=dbus auid=unset ses=unset subj=system_u:system_r:system_dbusd_t:s0-s0:c0.c1023 msg='avc:  received setenforce notice (enforcing=0)  exe=/usr/bin/dbus-daemon sauid=dbus hostname=? addr=? terminal=?' 
----
type=PROCTITLE msg=audit(06/22/2020 03:31:07.236:394) : proctitle=/usr/sbin/smbd --foreground --no-process-group 
type=SYSCALL msg=audit(06/22/2020 03:31:07.236:394) : arch=x86_64 syscall=openat success=yes exit=14 a0=0xffffff9c a1=0x55660a9d1100 a2=O_RDWR|O_CREAT|O_NOFOLLOW a3=0x180 items=0 ppid=22724 pid=25960 auid=unset uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=(none) ses=unset comm=smbd exe=/usr/sbin/smbd subj=system_u:system_r:smbd_t:s0 key=(null) 
type=AVC msg=audit(06/22/2020 03:31:07.236:394) : avc:  denied  { write } for  pid=25960 comm=smbd name=krb5_0.rcache2 dev="dm-0" ino=101548621 scontext=system_u:system_r:smbd_t:s0 tcontext=system_u:object_r:kadmind_tmp_t:s0 tclass=file permissive=1 


> 
> You created this bugzilla with the severity of Urgent. This means:
> 
>     catastrophic issues which severely impact the mission-critical
> operations of an organization. This may mean that the operational servers,
> development systems or customer applications are down or not functioning and
> no procedural workaround exists.
> 
> Please explain the impact so that we can act accordingly.

In RHEL-8.2, this issue doesn't exist. The cifs can be mounted with krb5 with selinux on. But in RHEL-8.3, it need to turn off selinux. That's why I set this bug urgent. But now I know setting samba_export_all_rw on also can fix this issue. 

> 
> As an immediate workaround, turn on the samba_export_all_rw boolean:
> 
>   # setsebool -P samba_export_all_rw on

After set samba_export_all_rw on, this issue also doesn't exist.

Comment 4 Zdenek Pytela 2020-06-22 11:05:06 UTC
Given the workaround helps to make the scenario working, I am adjusting the severity/priority. Note this can not be considered as a solution.

Please refer to bz#1848953, we may find a way how to resolve the issue generally and eventually make this bz a duplicate.

Comment 5 xiaoli feng 2020-06-23 08:22:28 UTC
This bug was created earlier than bz#1848953. So I think bz#1848953 is a duplicate of this bz.

Comment 6 xiaoli feng 2020-07-21 07:48:55 UTC
Hello Zdenek,

what's going on for this bug?

Thanks.

Comment 9 xiaoli feng 2020-07-22 01:47:04 UTC
Hello Zdenet,

Could you provide devel_ack+?

Thanks.

Comment 10 xiaoli feng 2020-07-22 01:48:14 UTC
Hello Milos,

Could you provide qa_ack+?

Thanks.

Comment 12 Zdenek Pytela 2020-07-27 16:17:51 UTC
This bug will be eventually resolved together with other similar bugs.
Closing as a dup of bz#1848953 which contains the most of information.

*** This bug has been marked as a duplicate of bug 1848953 ***

Comment 13 Red Hat Bugzilla 2023-09-14 06:02:12 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 1000 days


Note You need to log in before you can comment on or make changes to this bug.