SELinux problem with BOINC
Joe Zeff
joe at zeff.us
Sun Jun 19 15:50:54 UTC 2011
Recently, I mentioned getting regular SELinux alerts from BOINC,
normally from Einstein at home. I've just received another one, although
from a WCT unit. Yes, I'm following the troubleshooting instructions as
I always do, and they seem to work, but only for that unit. (Using
restorecon as root is all that's needed.) Somebody on the list asked to
see the details, so here they are:
SELinux is preventing
/var/lib/boinc/projects/www.worldcommunitygrid.org/wcg_hpf2_rosetta_6.40_i686-pc-linux-gnu
from 'read, write' accesses on the chr_file /dev/nvidiactl.
***** Plugin restorecon (89.7 confidence) suggests
*************************
If you want to fix the label.
/dev/nvidiactl default label should be xserver_misc_device_t.
Then you can run restorecon.
Do
# /sbin/restorecon -v /dev/nvidiactl
***** Plugin device (9.42 confidence) suggests
*****************************
If you want to allow wcg_hpf2_rosetta_6.40_i686-pc-linux-gnu to have
read write access on the nvidiactl chr_file
Then you need to change the label on /dev/nvidiactl to a type of a
similar device.
Do
# semanage fcontext -a -t SIMILAR_TYPE '/dev/nvidiactl'
# restorecon -v '/dev/nvidiactl'
***** Plugin catchall (1.39 confidence) suggests
***************************
If you believe that wcg_hpf2_rosetta_6.40_i686-pc-linux-gnu should be
allowed read write access on the nvidiactl chr_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep wcg_hpf2_rosett /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp
***** Plugin leaks (1.39 confidence) suggests
******************************
If you want to ignore wcg_hpf2_rosetta_6.40_i686-pc-linux-gnu trying to
read write access the nvidiactl chr_file, because you believe it should
not need this access.
Then you should report this as a bug.
You can generate a local policy module to dontaudit this access.
Do
# grep
/var/lib/boinc/projects/www.worldcommunitygrid.org/wcg_hpf2_rosetta_6.40_i686-pc-linux-gnu
/var/log/audit/audit.log | audit2allow -D -M mypol
# semodule -i mypol.pp
Additional Information:
Source Context system_u:system_r:boinc_project_t:s0
Target Context system_u:object_r:device_t:s0
Target Objects /dev/nvidiactl [ chr_file ]
Source wcg_hpf2_rosett
Source Path
/var/lib/boinc/projects/www.worldcommunitygrid.org
/wcg_hpf2_rosetta_6.40_i686-pc-linux-gnu
Port <Unknown>
Host khorlia.zeff.us
Source RPM Packages
Target RPM Packages
Policy RPM selinux-policy-3.9.7-40.fc14
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name khorlia.zeff.us
Platform Linux khorlia.zeff.us
2.6.35.13-92.fc14.i686 #1
SMP Sat May 21 17:39:42 UTC 2011 i686 i686
Alert Count 1
First Seen Sun 19 Jun 2011 03:40:33 AM PDT
Last Seen Sun 19 Jun 2011 03:40:33 AM PDT
Local ID 11d810b9-b11c-4bad-ad33-11fd32e3232a
Raw Audit Messages
type=AVC msg=audit(1308480033.334:1452): avc: denied { read write }
for pid=4942 comm="wcg_hpf2_rosett" path="/dev/nvidiactl" dev=devtmpfs
ino=14053 scontext=system_u:system_r:boinc_project_t:s0
tcontext=system_u:object_r:device_t:s0 tclass=chr_file
type=SYSCALL msg=audit(1308480033.334:1452): arch=i386 syscall=execve
success=yes exit=0 a0=bfd279e8 a1=bfd23044 a2=9a9e640 a3=bfd279e8
items=0 ppid=4925 pid=4942 auid=0 uid=495 gid=490 euid=495 suid=495
fsuid=495 egid=490 sgid=490 fsgid=490 tty=(none) ses=167
comm=wcg_hpf2_rosett
exe=/var/lib/boinc/projects/www.worldcommunitygrid.org/wcg_hpf2_rosetta_6.40_i686-pc-linux-gnu
subj=system_u:system_r:boinc_project_t:s0 key=(null)
Hash: wcg_hpf2_rosett,boinc_project_t,device_t,chr_file,read,write
audit2allow
#============= boinc_project_t ==============
allow boinc_project_t device_t:chr_file { read write };
audit2allow -R
#============= boinc_project_t ==============
allow boinc_project_t device_t:chr_file { read write };
More information about the users
mailing list