Bug 2353898

Summary: SELinux is preventing /usr/bin/systemctl from read access on the directory journal.
Product: [Fedora] Fedora EPEL Reporter: a.savchuk
Component: cobblerAssignee: Orion Poplawski <orion>
Status: NEW --- QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: epel9CC: a.savchuk, brejoc, kwizart, matrixfueller, ngompa13, orion
Target Milestone: ---Keywords: SELinux
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description a.savchuk 2025-03-20 15:13:27 UTC
Description of problem:

SELinux is preventing /usr/bin/systemctl from read access on the directory journal.

*****  Plugin catchall (100. confidence) suggests   **************************

If you believe that systemctl should be allowed read access on the journal directory by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'systemctl' --raw | audit2allow -M my-systemctl
# semodule -X 300 -i my-systemctl.pp


Additional Information:
Source Context                system_u:system_r:cobblerd_t:s0
Target Context                system_u:object_r:syslogd_var_run_t:s0
Target Objects                journal [ dir ]
Source                        systemctl
Source Path                   /usr/bin/systemctl
Port                          <Unknown>
Host                          <Unknown>
Source RPM Packages           systemd-252-46.0.3.el9_5.3.x86_64
Target RPM Packages           
SELinux Policy RPM            selinux-policy-targeted-38.1.45-3.0.1.el9_5.noarch
Local Policy RPM              cobbler-selinux-3.3.7-1.el9.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     netboot.bp.local
Platform                      Linux netboot.bp.local
                              5.14.0-503.31.1.el9_5.x86_64 #1 SMP
                              PREEMPT_DYNAMIC Tue Mar 11 08:08:01 PDT 2025
                              x86_64 x86_64
Alert Count                   3
First Seen                    2025-03-19 19:38:10 +04
Last Seen                     2025-03-19 20:08:52 +04
Local ID                      3658eec8-8164-4565-bdf2-9a7240941dfd

Raw Audit Messages
type=AVC msg=audit(1742400532.976:9660): avc:  denied  { read } for  pid=53985 comm="systemctl" name="journal" dev="tmpfs" ino=60 scontext=system_u:system_r:cobblerd_t:s0 tcontext=system_u:object_r:syslogd_var_run_t:s0 tclass=dir permissive=0


type=SYSCALL msg=audit(1742400532.976:9660): arch=x86_64 syscall=openat success=no exit=EACCES a0=ffffff9c a1=7fc7ecd0cd60 a2=90800 a3=0 items=0 ppid=53984 pid=53985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=systemctl exe=/usr/bin/systemctl subj=system_u:system_r:cobblerd_t:s0 key=(null)ARCH=x86_64 SYSCALL=openat AUID=unset UID=root GID=root EUID=root SUID=root FSUID=root EGID=root SGID=root FSGID=root

Hash: systemctl,cobblerd_t,syslogd_var_run_t,dir,read


Version-Release number of selected component (if applicable):

# rpm -qa cobbler*
cobbler-selinux-3.3.7-1.el9.noarch
cobbler-3.3.7-1.el9.noarch

# rpm -qa systemd
systemd-252-46.0.3.el9_5.3.x86_64

How reproducible: always

Steps to Reproduce:

1. dnf install cobbler 
2. systemctl start cobblerd
3. cobbler check

Actual results: SELinux prevents /usr/bin/systemctl run by cobblerd from read access on the directory journal.

Expected results: 'cobbler check' does not result in SELinux errors.

Comment 1 a.savchuk 2025-05-26 15:27:07 UTC
I found that the audit message is related to executing 'cobblerd check' command. I have corrected my original message accordingly.