Bug 437786 - [RHEL5 U2] SELinux AVC Denied message, After upgrading from U1
[RHEL5 U2] SELinux AVC Denied message, After upgrading from U1
Status: CLOSED NOTABUG
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: selinux-policy (Show other bugs)
5.2
All Linux
low Severity high
: rc
: ---
Assigned To: Daniel Walsh
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2008-03-17 10:04 EDT by Jeff Burke
Modified: 2008-03-17 10:41 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2008-03-17 10:41:18 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Jeff Burke 2008-03-17 10:04:20 EDT
Description of problem:
 I upgraded my desktop system from RHEL5.U1 to RHEL5.2-Client-20080313.0. After
upgrading I rebooted and the system gets AVC Denied while booting.

Version-Release number of selected component (if applicable):
 libselinux-devel-1.33.4-5.el5
 libselinux-1.33.4-5.el5
 libselinux-python-1.33.4-5.el5
 selinux-policy-2.4.6-125.el5
 selinux-policy-targeted-2.4.6-125.el5

How reproducible:
 Always

Actual results:
Mar 17 09:19:37 barron kernel: audit(1205759975.999:4): avc:  denied  { search }
for  pid=2408 comm="rpc.statd" name="yp" dev=dm-0 ino=12025900
scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:object_r:var_yp_t:s0
tclass=dir
Mar 17 09:19:37 barron kernel: audit(1205759976.014:5): avc:  denied  { search }
for  pid=2408 comm="rpc.statd" name="yp" dev=dm-0 ino=12025900
scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:object_r:var_yp_t:s0
tclass=dir
Mar 17 09:19:37 barron kernel: audit(1205759976.041:6): avc:  denied  { search }
for  pid=2408 comm="rpc.statd" name="yp" dev=dm-0 ino=12025900
scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:object_r:var_yp_t:s0
tclass=dir
Mar 17 09:19:37 barron kernel: audit(1205759976.043:7): avc:  denied  { search }
for  pid=2408 comm="rpc.statd" name="yp" dev=dm-0 ino=12025900
scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:object_r:var_yp_t:s0
tclass=dir
Mar 17 09:19:37 barron kernel: audit(1205759976.044:8): avc:  denied  { search }
for  pid=2408 comm="rpc.statd" name="yp" dev=dm-0 ino=12025900
scontext=system_u:system_r:rpcd_t:s0 tcontext=system_u:object_r:var_yp_t:s0
tclass=dir
Mar 17 09:19:37 barron kernel: audit(1205759976.320:9): avc:  denied  { search }
for  pid=2463 comm="dbus-daemon" name="yp" dev=dm-0 ino=12025900
scontext=system_u:system_r:system_dbusd_t:s0
tcontext=system_u:object_r:var_yp_t:s0 tclass=dir
Mar 17 09:19:37 barron kernel: audit(1205759976.320:10): avc:  denied  {
node_bind } for  pid=2463 comm="dbus-daemon"
scontext=system_u:system_r:system_dbusd_t:s0
tcontext=system_u:object_r:inaddr_any_node_t:s0 tclass=tcp_socket
Mar 17 09:19:37 barron kernel: audit(1205759976.320:11): avc:  denied  {
name_bind } for  pid=2463 comm="dbus-daemon" src=943
scontext=system_u:system_r:system_dbusd_t:s0
tcontext=system_u:object_r:hi_reserved_port_t:s0 tclass=tcp_socket
Mar 17 09:19:37 barron kernel: audit(1205759976.320:12): avc:  denied  {
name_connect } for  pid=2463 comm="dbus-daemon" dest=111
scontext=system_u:system_r:system_dbusd_t:s0
tcontext=system_u:object_r:portmap_port_t:s0 tclass=tcp_socket
Mar 17 09:19:37 barron kernel: audit(1205759976.321:13): avc:  denied  { search
} for  pid=2463 comm="dbus-daemon" name="yp" dev=dm-0 ino=12025900
scontext=system_u:system_r:system_dbusd_t:s0
tcontext=system_u:object_r:var_yp_t:s0 tclass=dir

Expected results:
 System should not get avc denied messages under normal boot

Additional info:
Comment 1 Daniel Walsh 2008-03-17 10:41:18 EDT
You are using ypbind so you need to turn on the allow_ypbind boolean.

setsebool -P allow_ypbind=1

Should fix this problem.

Note You need to log in before you can comment on or make changes to this bug.