Re: doing docker build, "SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.", kills wireless

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 08/19/2015 08:41 AM, Robert P. J. Day wrote:
On Wed, 19 Aug 2015, Daniel J Walsh wrote:



On 08/19/2015 07:36 AM, Robert P. J. Day wrote:
On Wed, 19 Aug 2015, Daniel J Walsh wrote:

On 08/19/2015 02:43 AM, Robert P. J. Day wrote:
On Tue, 18 Aug 2015, Robert P. J. Day wrote:

   by now, i'm getting *really* good at debugging. was doing a simple
docker build (docker-1.8.1) with first few lines of Dockerfile (which
worked fine not that long ago):

   FROM ubuntu:14.04
   MAINTAINER Robert P. J. Day
   ENV REFRESHED_AT 2015-08-18

   RUN apt-get -y -q update && apt-get -y -q install nginx
   ... snip ...

and it was *entirely* reproducible that the instant docker started to
process that "RUN apt-get" command, the wireless connection on my
Fedora 22 laptop was blown away. grabbed this from SELinux:

===== start =====

SELinux is preventing /usr/libexec/abrt-hook-ccpp from using the sigchld access on a process.

*****  Plugin catchall (100. confidence) suggests   **************************

If you believe that abrt-hook-ccpp should be allowed sigchld access on processes labeled kernel_t by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep abrt-hook-ccpp /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                system_u:system_r:NetworkManager_t:s0
Target Context                system_u:system_r:kernel_t:s0
Target Objects                Unknown [ process ]
Source                        abrt-hook-ccpp
Source Path                   /usr/libexec/abrt-hook-ccpp
Port                          <Unknown>
Host                          localhost.localdomain
Source RPM Packages           abrt-addon-coredump-helper-2.6.1-2.fc22.x86_64
Target RPM Packages
Policy RPM                    selinux-policy-3.13.1-128.10.fc22.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Permissive
Host Name                     localhost.localdomain
Platform                      Linux localhost.localdomain 4.1.5-200.fc22.x86_64
                               #1 SMP Mon Aug 10 23:38:23 UTC 2015 x86_64 x86_64
Alert Count                   1
First Seen                    2015-08-18 12:57:36 EDT
Last Seen                     2015-08-18 12:57:36 EDT
Local ID                      523c8bed-7428-49e7-b301-3a932852b135

Raw Audit Messages
type=AVC msg=audit(1439917056.327:640): avc:  denied  { sigchld } for  pid=4555 comm="abrt-hook-ccpp" scontext=system_u:system_r:NetworkManager_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1


type=SYSCALL msg=audit(1439917056.327:640): arch=x86_64 syscall=wait4 success=yes exit=1273 a0=4f9 a1=7fffdb95f19c a2=0 a3=0 items=0 ppid=131 pid=4555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=abrt-hook-ccpp exe=/usr/libexec/abrt-hook-ccpp subj=system_u:system_r:kernel_t:s0 key=(null)

Hash: abrt-hook-ccpp,NetworkManager_t,kernel_t,process,sigchld

===== end =====
   followup to the above ... i ran the suggested selinux-related
commands, but that had no apparent effect, so i'm still stuck. for
people who know docker, you'll recognize that the error occurred at
the first instruction in the Dockerfile that requires network access,
the "RUN apt-get ..." command (i already have the ubuntu base image on
my system).

   i grabbed a few hundred lines from "journalctl" and stuck them here:
http://pastebin.com/KzrYMFvC. you can see the very first command there
is the docker invocation:

Aug 19 05:24:35 localhost.localdomain sudo[4190]:   rpjday : TTY=pts/0
; PWD=/home/rpjday/docker/TDB/sample ; USER=root ; COMMAND=/bin/docker
build -t jamtur01/nginx .

   thoughts? is it bugzilla time?

rday

Yes open a bugzilla, although this is a very strange AVC.  It basically
shows abrt-hook-ccpp executing under networkmanager domain and sending
sigchld to kernel_t.

Why would networkmanager execed processes be sending a sigchld to a
kernel process?
   beats me, this is way outside my comfort zone. by the way, even
though selinux was in permissive mode, i thought i'd play it safe and
just disable it entirely, so i did, rebooted, "sestatus" clearly shows
selinux disabled, but i got the same error.

   i'll do it one more time shortly just to make sure it's not some
intermittent weirdness, then i'll BZ it. open to suggestions as to
anything else i might try, or add to the BZ submission.

rday

With SELinux disabled you should not be getting any AVC's

If you turn SELInux back on and do a full relabel, I think the
problem will go away.

   no difference ... i edited /etc/selinux/config, set
SELINUX=enforcing, rebooted and let my system chug away relabelling,
came back up, tested again ... same result.

While I have seen both AVCs and actual blocks from selinux in
permissive mode in the past (and specifically on network stuff), if
you've disabled selinux on the host machine I don't see how it could
generate an AVC at all.

Are you certain the AVC isn't coming from the dockerized OS itself? I
could see the AVC being generated on the docker and getting reflected
back to the host somehow (I suspect critical messages from the dockers
get piped through so you're aware of them, but that's a wild guess).
----------------------------------------------------------------------
- Rick Stevens, Systems Engineer, AllDigital    ricks@xxxxxxxxxxxxxx -
- AIM/Skype: therps2        ICQ: 226437340           Yahoo: origrps2 -
-                                                                    -
-           grep me no patterns and I'll tell you no lines           -
----------------------------------------------------------------------
--
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org



[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux