Bug 1309604

Summary: SELinux is preventing systemctl from using the 'setrlimit' accesses on a process.
Product: [Fedora] Fedora Reporter: Stefan Joosten <stefan+redhatbugs>
Component: selinux-policyAssignee: Lukas Vrabec <lvrabec>
Status: CLOSED ERRATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: high Docs Contact:
Priority: high    
Version: 23CC: dominick.grift, dwalsh, lvrabec, mgrepl, plautrba
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
Whiteboard: abrt_hash:0be585da5cabd6b7c468e0a2b66ded0c4c94fcd9c4f44fbc260b7cdedc46262c;VARIANT_ID=workstation;
Fixed In Version: selinux-policy-3.13.1-158.11.fc23 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-03-25 01:24:09 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Stefan Joosten 2016-02-18 09:29:53 UTC
Description of problem:
SELinux is preventing systemctl from using the 'setrlimit' accesses on a process.

*****  Plugin catchall (100. confidence) suggests   **************************

If you believe that systemctl should be allowed setrlimit access on processes labeled logrotate_t by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep systemctl /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                system_u:system_r:logrotate_t:s0-s0:c0.c1023
Target Context                system_u:system_r:logrotate_t:s0-s0:c0.c1023
Target Objects                Unknown [ process ]
Source                        systemctl
Source Path                   systemctl
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           
Policy RPM                    <Unknown>
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 4.3.5-300.fc23.x86_64 #1 SMP Mon
                              Feb 1 03:18:41 UTC 2016 x86_64 x86_64
Alert Count                   1
First Seen                    2016-02-18 10:06:01 CET
Last Seen                     2016-02-18 10:06:01 CET
Local ID                      d3e3b4ff-1d09-4a85-917a-6d266689dba6

Raw Audit Messages
type=AVC msg=audit(1455786361.502:635): avc:  denied  { setrlimit } for  pid=3536 comm="systemctl" scontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023 tcontext=system_u:system_r:logrotate_t:s0-s0:c0.c1023 tclass=process permissive=0


Hash: systemctl,logrotate_t,logrotate_t,process,setrlimit


Additional info:
reporter:       libreport-2.6.4
hashmarkername: setroubleshoot
kernel:         4.3.5-300.fc23.x86_64
type:           libreport

Potential duplicate: bug 1185621

Comment 1 Miroslav Grepl 2016-02-18 12:53:04 UTC
Any chance, you  are running low on system resources?

Comment 2 Daniel Walsh 2016-02-20 11:28:07 UTC
This should be just dontaudited.  I believe anyone calling systemctl will trigger this avc.

Comment 3 Lukas Vrabec 2016-03-16 15:21:10 UTC
commit d903b0a352346bca034239c8aad46a3b88e31784
Author: Lukas Vrabec <lvrabec>
Date:   Wed Mar 16 16:19:30 2016 +0100

    Dontaudit logrotate to setrlimit itself. rhbz#1309604

Comment 4 Fedora Update System 2016-03-16 20:42:52 UTC
selinux-policy-3.13.1-158.11.fc23 has been submitted as an update to Fedora 23. https://bodhi.fedoraproject.org/updates/FEDORA-2016-b9df861e78

Comment 5 Fedora Update System 2016-03-19 01:26:09 UTC
selinux-policy-3.13.1-158.11.fc23 has been pushed to the Fedora 23 testing repository. If problems still persist, please make note of it in this bug report.
See https://fedoraproject.org/wiki/QA:Updates_Testing for
instructions on how to install test updates.
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2016-b9df861e78

Comment 6 Fedora Update System 2016-03-25 01:24:04 UTC
selinux-policy-3.13.1-158.11.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.