Bug 494581 - SELinux is preventing devkit-disks-he (devicekit_disk_t) "sys_rawio" devicekit_disk_t
SELinux is preventing devkit-disks-he (devicekit_disk_t) "sys_rawio" deviceki...
Status: CLOSED RAWHIDE
Product: Fedora
Classification: Fedora
Component: selinux-policy-targeted (Show other bugs)
rawhide
All Linux
low Severity medium
: ---
: ---
Assigned To: Daniel Walsh
Ben Levenson
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2009-04-07 10:34 EDT by Dave Jones
Modified: 2015-01-04 17:30 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2009-04-07 10:58:46 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Dave Jones 2009-04-07 10:34:05 EDT
Summary:

SELinux is preventing devkit-disks-he (devicekit_disk_t) "sys_rawio"
devicekit_disk_t.

Detailed Description:

SELinux denied access requested by devkit-disks-he. It is not expected that this
access is required by devkit-disks-he and this access may signal an intrusion
attempt. It is also possible that the specific version or configuration of the
application is causing it to require additional access.

Allowing Access:

You can generate a local policy module to allow this access - see FAQ
(http://fedora.redhat.com/docs/selinux-faq-fc5/#id2961385) Or you can disable
SELinux protection altogether. Disabling SELinux protection is not recommended.
Please file a bug report (http://bugzilla.redhat.com/bugzilla/enter_bug.cgi)
against this package.

Additional Information:

Source Context                system_u:system_r:devicekit_disk_t:s0-s0:c0.c1023
Target Context                system_u:system_r:devicekit_disk_t:s0-s0:c0.c1023
Target Objects                None [ capability ]
Source                        devkit-disks-he
Source Path                   /usr/libexec/devkit-disks-helper-ata-smart-collect
Port                          <Unknown>
Host                          zerosum
Source RPM Packages           DeviceKit-disks-004-0.4.20090406git.fc11
Target RPM Packages           
Policy RPM                    selinux-policy-3.6.10-9.fc11
Selinux Enabled               True
Policy Type                   targeted
MLS Enabled                   True
Enforcing Mode                Enforcing
Plugin Name                   catchall
Host Name                     zerosum
Platform                      Linux zerosum 2.6.29.1-52.fc11.x86_64 #1 SMP Mon
                              Apr 6 03:50:07 EDT 2009 x86_64 x86_64
Alert Count                   1
First Seen                    Tue Apr  7 09:38:54 2009
Last Seen                     Tue Apr  7 09:38:54 2009
Local ID                      87e1a9bc-c227-4852-b001-b1ff7bf8853b
Line Numbers                  

Raw Audit Messages            

node=zerosum type=AVC msg=audit(1239111534.616:13): avc:  denied  { sys_rawio } for  pid=3073 comm="devkit-disks-he" capability=17 scontext=system_u:system_r:devicekit_disk_t:s0-s0:c0.c1023 tcontext=system_u:system_r:devicekit_disk_t:s0-s0:c0.c1023 tclass=capability

node=zerosum type=SYSCALL msg=audit(1239111534.616:13): arch=c000003e syscall=16 success=yes exit=0 a0=3 a1=2285 a2=7fffbf850280 a3=3 items=0 ppid=3067 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="devkit-disks-he" exe="/usr/libexec/devkit-disks-helper-ata-smart-collect" subj=system_u:system_r:devicekit_disk_t:s0-s0:c0.c1023 key=(null)
Comment 1 Daniel Walsh 2009-04-07 10:58:46 EDT
You can add these rules for now using

# grep avc /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Fixed in selinux-policy-3.6.11-2.fc11.noarch

Note You need to log in before you can comment on or make changes to this bug.