Bug 2052998

Summary: AVC failures seen with: denied { unlink } comm="systemd-user-ru"
Product: Red Hat Enterprise Linux 9 Reporter: Varun Mylaraiah <mvarun>
Component: selinux-policyAssignee: Zdenek Pytela <zpytela>
Status: CLOSED DUPLICATE QA Contact: BaseOS QE Security Team <qe-baseos-security>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 9.0CC: lvrabec, mmalik, ssekidde
Target Milestone: rcFlags: pm-rhel: mirror+
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-02-10 12:34:21 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Varun Mylaraiah 2022-02-10 12:14:32 UTC
Description of problem:
AVC failure found in bash tests of RHEL9.0

SELinux status:                 enabled
SELinuxfs mount:                /sys/fs/selinux
SELinux root directory:         /etc/selinux
Loaded policy name:             targeted
Current mode:                   enforcing
Mode from config file:          enforcing
Policy MLS status:              enabled
Policy deny_unknown status:     allowed
Memory protection checking:     actual (secure)
Max kernel policy version:      33
selinux-policy-34.1.23-1.el9.noarch
----
time->Thu Feb 10 05:18:01 2022
type=PROCTITLE msg=audit(1644488281.567:1786): proctitle=2F7573722F6C69622F73797374656D642F73797374656D642D757365722D72756E74696D652D6469720073746F700031303030
type=PATH msg=audit(1644488281.567:1786): item=1 name="bus" inode=15 dev=00:29 mode=0140666 ouid=1000 ogid=1000 rdev=00:00 obj=unconfined_u:object_r:session_dbusd_tmp_t:s0 nametype=DELETE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
type=PATH msg=audit(1644488281.567:1786): item=0 name="/" inode=1 dev=00:29 mode=040700 ouid=1000 ogid=1000 rdev=00:00 obj=unconfined_u:object_r:user_tmp_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
type=CWD msg=audit(1644488281.567:1786): cwd="/"
type=SYSCALL msg=audit(1644488281.567:1786): arch=c000003e syscall=263 success=no exit=-13 a0=3 a1=56335494b923 a2=0 a3=9b items=2 ppid=1 pid=20644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-user-ru" exe="/usr/lib/systemd/systemd-user-runtime-dir" subj=system_u:system_r:systemd_logind_t:s0 key=(null)
type=AVC msg=audit(1644488281.567:1786): avc:  denied  { unlink } for  pid=20644 comm="systemd-user-ru" name="bus" dev="tmpfs" ino=15 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=unconfined_u:object_r:session_dbusd_tmp_t:s0 tclass=sock_file permissive=0

Comment 1 Zdenek Pytela 2022-02-10 12:34:21 UTC

*** This bug has been marked as a duplicate of bug 2000039 ***