Bug 441410 - SELinux is preventing 05-netfs (NetworkManager_t) "getattr" to /var/lock/subsys/netfs (var_lock_t).
SELinux is preventing 05-netfs (NetworkManager_t) "getattr" to /var/lock/subs...
Status: CLOSED RAWHIDE
Product: Fedora
Classification: Fedora
Component: NetworkManager (Show other bugs)
rawhide
All Linux
low Severity low
: ---
: ---
Assigned To: Dan Williams
Fedora Extras Quality Assurance
: SELinux
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2008-04-07 17:54 EDT by Matěj Cepl
Modified: 2008-04-08 10:06 EDT (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2008-04-08 10:06:58 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Matěj Cepl 2008-04-07 17:54:35 EDT
Description of problem:

Souhrn:

SELinux is preventing 05-netfs (NetworkManager_t) "getattr" to
/var/lock/subsys/netfs (var_lock_t).

Podrobný popis:

SELinux denied access requested by 05-netfs. It is not expected that this access
is required by 05-netfs and this access may signal an intrusion attempt. It is
also possible that the specific version or configuration of the application is
causing it to require additional access.

Povolení přístupu:

Sometimes labeling problems can cause SELinux denials. You could try to restore
the default system file context for /var/lock/subsys/netfs,

restorecon -v '/var/lock/subsys/netfs'

If this does not work, there is currently no automatic way to allow this access.
Instead, you can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

Další informace:

Kontext zdroje                system_u:system_r:NetworkManager_t
Kontext cíle                 system_u:object_r:var_lock_t
Objekty cíle                 /var/lock/subsys/netfs [ file ]
Zdroj                         05-netfs
Cesta zdroje                  /bin/bash
Port                          <Neznámé>
Počítač                    viklef.ceplovi.cz
RPM balíčky zdroje          bash-3.2-22.fc9
RPM balíčky cíle           
RPM politiky                  selinux-policy-3.3.1-28.fc9
Selinux povolen               True
Typ politiky                  targeted
MLS povoleno                  True
Vynucovací režim            Enforcing
Název zásuvného modulu     catchall_file
Název počítače            viklef.ceplovi.cz
Platforma                     Linux viklef.ceplovi.cz
                              2.6.25-0.200.rc8.git3.fc9.i686 #1 SMP Sat Apr 5
                              00:00:10 EDT 2008 i686 i686
Počet uporoznění           1
Poprvé viděno               Po 7. duben 2008, 20:08:26 CEST
Naposledy viděno             Po 7. duben 2008, 20:08:26 CEST
Místní ID                   4feec611-7ed2-4318-9660-e56d4443c9e6
Čísla řádků              

Původní zprávy auditu      

host=viklef.ceplovi.cz type=AVC msg=audit(1207591706.59:89): avc:  denied  {
getattr } for  pid=5208 comm="05-netfs" path="/var/lock/subsys/netfs" dev=dm-0
ino=1274585 scontext=system_u:system_r:NetworkManager_t:s0
tcontext=system_u:object_r:var_lock_t:s0 tclass=file

host=viklef.ceplovi.cz type=SYSCALL msg=audit(1207591706.59:89): arch=40000003
syscall=195 success=no exit=-13 a0=874aa50 a1=bfd90480 a2=390ff4 a3=874aa50
items=0 ppid=2590 pid=5208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0
egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="05-netfs" exe="/bin/bash"
subj=system_u:system_r:NetworkManager_t:s0 key=(null)


Version-Release number of selected component (if applicable):
bash-3.2-22.fc9.i386
NetworkManager-0.7.0-0.9.1.svn3521.fc9.i386
selinux-policy-targeted-3.3.1-28.fc9.noarch
Comment 1 Daniel Walsh 2008-04-08 10:06:58 EDT
You can allow this for now by executing 

# audit2allow -M mypol -i /var/log/audit/audit.log 
# semodule -i mypol.pp

Fixed in selinux-policy-3.3.1-29.fc9

Note You need to log in before you can comment on or make changes to this bug.