• Icon: Bug Bug
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • rhel-9.6.z
    • rhel-9.6.z
    • pcp
    • None
    • pcp-6.3.7-1.el9_6
    • No
    • Low
    • 1
    • rhel-sst-pt-pcp
    • ssg_platform_tools
    • 1
    • Dev ack
    • False
    • Hide

      None

      Show
      None
    • No
    • PT PCP 2025 S04
    • Unspecified Release Note Type - Unknown
    • Unspecified
    • Unspecified
    • Unspecified
    • All
    • None

      What were you trying to do that didn't work?

      When pcp-pmda-lio is registerd and used, it triggers some selinux AVCs

      What is the impact of this issue to you?

      lio metrics not providing proper values and the pmda generates AVCs

      Please provide the package NVR for which the bug is seen:

      pcp-6.3.4-1.el9_6 (but this issue has been see even on older builds)

      How reproducible is this bug?:

      Always

      Steps to reproduce

      1. Install pcp-pmda-lio
        yum install -y pcp-pmda-lio
      1. Register the pmda
        cd /var/lib/pcp/pmdas/lio && ./Install
      1. Fetch lio metrics
        pminfo -f lio

      Expected results

      No AVC recorded

      Actual results

      The following AVC are recorded

      type=AVC msg=audit(03/17/25 09:44:43.261:13256) : avc:  denied  { module_load } for  pid=243375 comm=python3 scontext=system_u:system_r:pcp_pmcd_t:s0 tcontext=system_u:system_r:pcp_pmcd_t:s0 tclass=system permissive=1
      type=AVC msg=audit(03/17/25 09:44:43.261:13257) : avc:  denied  { write } for  pid=243375 comm=python3 name=dbroot dev="configfs" ino=485726 scontext=system_u:system_r:pcp_pmcd_t:s0 tcontext=system_u:object_r:configfs_t:s0 tclass=file permissive=1
      type=AVC msg=audit(03/17/25 09:44:43.261:13257) : avc:  denied  { create } for  pid=243375 comm=python3 name=dbroot scontext=system_u:system_r:pcp_pmcd_t:s0 tcontext=system_u:object_r:configfs_t:s0 tclass=file permissive=1
      type=AVC msg=audit(03/17/25 09:44:43.261:13257) : avc:  denied  { add_name } for  pid=243375 comm=python3 name=dbroot scontext=system_u:system_r:pcp_pmcd_t:s0 tcontext=system_u:object_r:configfs_t:s0 tclass=dir permissive=1
      
      # audit2allow -a
      
      #============= pcp_pmcd_t ==============
      allow pcp_pmcd_t configfs_t:dir add_name;
      allow pcp_pmcd_t configfs_t:file { create write };
      allow pcp_pmcd_t self:system module_load;
      

              nathans@redhat.com Nathan Scott
              jkurik@redhat.com Jan Kurik
              pcp-maint pcp-maint
              Jan Kurik Jan Kurik
              Votes:
              0 Vote for this issue
              Watchers:
              6 Start watching this issue

                Created:
                Updated: