Bug 560323 - SELinux is preventing audispd "read" access on fifo_file.
Summary: SELinux is preventing audispd "read" access on fifo_file.
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: upstart
Version: rawhide
Hardware: x86_64
OS: Linux
low
medium
Target Milestone: ---
Assignee: Casey Dahlin
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: setroubleshoot_trace_hash:5cd24a7a5dd...
: 560131 560774 561579 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-01-31 00:08 UTC by Jan Alonzo
Modified: 2014-06-18 08:47 UTC (History)
9 users (show)

Fixed In Version: selinux-policy-3.7.10-3.fc13
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-02-24 08:05:14 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
Error Output from SETroubleshooter (2.55 KB, text/plain)
2010-02-20 16:12 UTC, Ray Evans
no flags Details

Description Jan Alonzo 2010-01-31 00:08:13 UTC
Summary:

SELinux is preventing audispd "read" access on fifo_file.

Detailed Description:

[SELinux is in permissive mode. This access was not denied.]

SELinux denied access requested by audispd. It is not expected that this access
is required by audispd and this access may signal an intrusion attempt. It is
also possible that the specific version or configuration of the application is
causing it to require additional access.

Allowing Access:

You can generate a local policy module to allow this access - see FAQ
(http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug
report.

Additional Information:

Source Context                system_u:system_r:audisp_t:s0
Target Context                system_u:system_r:init_t:s0
Target Objects                fifo_file [ fifo_file ]
Source                        audispd
Source Path                   audispd
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           
Policy RPM                    selinux-policy-3.7.8-5.fc13
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Permissive
Plugin Name                   catchall
Host Name                     (removed)
Platform                      Linux (removed)
                              2.6.33-0.25.rc6.git0.fc13.x86_64 #1 SMP Sat Jan 30
                              00:43:44 UTC 2010 x86_64 x86_64
Alert Count                   1
First Seen                    Sun 31 Jan 2010 11:05:03 AM EST
Last Seen                     Sun 31 Jan 2010 11:05:03 AM EST
Local ID                      408d99c1-86cb-4945-86e7-a7beb8c706d8
Line Numbers                  

Raw Audit Messages            

node=(removed) type=AVC msg=audit(1264896303.957:21815): avc:  denied  { read } for  pid=2030 comm="audispd" path="pipe:[15511]" dev=pipefs ino=15511 scontext=system_u:system_r:audisp_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=fifo_file



Hash String generated from  catchall,audispd,audisp_t,init_t,fifo_file,read
audit2allow suggests:

#============= audisp_t ==============
allow audisp_t init_t:fifo_file read;

Comment 1 Daniel Walsh 2010-02-01 19:30:22 UTC
*** Bug 560131 has been marked as a duplicate of this bug. ***

Comment 2 Daniel Walsh 2010-02-01 19:30:56 UTC
Looks like init is leaking access to its fifo file.

Comment 3 Casey Dahlin 2010-02-01 19:42:05 UTC
If I could get an lsof result while this is running it'd be helpful. I'll try to reproduce when I get home.

Comment 4 Daniel Walsh 2010-02-02 12:53:57 UTC
*** Bug 560774 has been marked as a duplicate of this bug. ***

Comment 5 Daniel Walsh 2010-02-04 13:22:20 UTC
*** Bug 561579 has been marked as a duplicate of this bug. ***

Comment 6 Ray Evans 2010-02-19 17:51:48 UTC
Repro with selinux-policy-3.7.9-1.fc13

Comment 7 Ray Evans 2010-02-19 18:02:48 UTC
Repro with selinux-policy-3.7.9-4.fc13

Comment 8 Ray Evans 2010-02-19 18:14:57 UTC
Casey and Daniel:
Would my lsof output be of any help?  This issue seems to occur during the boot cycle.  Is there a method to run lsof at boot?

Comment 9 Daniel Walsh 2010-02-20 13:17:33 UTC
Ray seems to be fixes on my machine.

# audit2allow -i /tmp/out 


#============= audisp_t ==============
#!!!! This avc is allowed in the current policy

allow audisp_t init_t:fifo_file read;
-bash-4.1# rpm -q selinux-policy
selinux-policy-3.7.9-3.fc13.noarch

Comment 10 Ray Evans 2010-02-20 14:57:41 UTC
Might have been a fluke, on my end.  I had to reformat my F13 test bed due to some RAWHIDE(F14)/F13 crossover updates that compromised the validity of testing I performed on 2010-02-19.  I will retest this evening, time permitting.

Comment 11 Ray Evans 2010-02-20 15:57:23 UTC
I have recreated my test bed and updated accordingly.  So far so good.  No recurrence of this issue.  I did install the selinux-policy-3.7.9-4.fc13.noarch from the F13 Testing repo.

Comment 12 Ray Evans 2010-02-20 16:07:56 UTC
Spoke too soon.  On reboot I was able to reproduce the error.

Comment 13 Ray Evans 2010-02-20 16:12:34 UTC
Created attachment 395275 [details]
Error Output from SETroubleshooter

Comment 14 Fedora Update System 2010-02-22 18:36:15 UTC
selinux-policy-3.7.10-1.fc13 has been submitted as an update for Fedora 13.
http://admin.fedoraproject.org/updates/selinux-policy-3.7.10-1.fc13

Comment 15 Daniel Walsh 2010-02-22 18:39:15 UTC
Could you try selinux-policy-3.7.10-1.fc13.noarch

Comment 16 Fedora Update System 2010-02-23 14:27:51 UTC
selinux-policy-3.7.10-2.fc13 has been submitted as an update for Fedora 13.
http://admin.fedoraproject.org/updates/selinux-policy-3.7.10-2.fc13

Comment 17 Fedora Update System 2010-02-23 16:04:37 UTC
selinux-policy-3.7.10-2.fc13 has been pushed to the Fedora 13 testing repository.  If problems still persist, please make note of it in this bug report.
 If you want to test the update, you can install it with 
 su -c 'yum --enablerepo=updates-testing update selinux-policy'.  You can provide feedback for this update here: http://admin.fedoraproject.org/updates/F13/FEDORA-2010-2622

Comment 18 Fedora Update System 2010-02-23 16:29:32 UTC
selinux-policy-3.7.10-2.fc13 has been submitted as an update for Fedora 13.
http://admin.fedoraproject.org/updates/F13/FEDORA-2010-2622

Comment 19 Fedora Update System 2010-02-23 21:07:28 UTC
selinux-policy-3.7.10-3.fc13 has been submitted as an update for Fedora 13.
http://admin.fedoraproject.org/updates/F13/FEDORA-2010-2622

Comment 20 Fedora Update System 2010-02-24 08:02:54 UTC
selinux-policy-3.7.10-3.fc13 has been pushed to the Fedora 13 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.