Bug 671596

Summary: SELinux is preventing systemd-readahe from 'write' accesses on the file /sbin/auditctl.
Product: [Fedora] Fedora Reporter: satellitgo
Component: selinux-policyAssignee: Miroslav Grepl <mgrepl>
Status: CLOSED DUPLICATE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: medium Docs Contact:
Priority: unspecified    
Version: rawhideCC: dwalsh, mgrepl, satellitgo
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard: setroubleshoot_trace_hash:122c58c88e455abfd88ff579acdb5c1ab14a00138b9ea8fbce8e1335732d6806
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-01-24 09:10:59 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description satellitgo 2011-01-22 01:15:00 UTC
SELinux is preventing systemd-readahe from 'write' accesses on the file /sbin/auditctl.

*****  Plugin catchall (100. confidence) suggests  ***************************

If you believe that systemd-readahe should be allowed write access on the auditctl file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep systemd-readahe /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                system_u:system_r:readahead_t:s0
Target Context                system_u:object_r:auditctl_exec_t:s0
Target Objects                /sbin/auditctl [ file ]
Source                        systemd-readahe
Source Path                   systemd-readahe
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           audit-2.0.5-2.fc15
Policy RPM                    selinux-policy-3.9.13-3.fc15
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Permissive
Host Name                     (removed)
Platform                      Linux (removed) 2.6.37-2.fc15.x86_64
                              #1 SMP Fri Jan 7 14:57:36 UTC 2011 x86_64 x86_64
Alert Count                   1
First Seen                    Sat 22 Jan 2011 01:12:32 AM EST
Last Seen                     Sat 22 Jan 2011 01:12:32 AM EST
Local ID                      60a04912-8a53-4552-99c1-62fabec74d1c

Raw Audit Messages
type=AVC msg=audit(1295676752.843:99): avc:  denied  { write } for  pid=343 comm="systemd-readahe" path="/sbin/auditctl" dev=dm-0 ino=18395 scontext=system_u:system_r:readahead_t:s0 tcontext=system_u:object_r:auditctl_exec_t:s0 tclass=file


Hash: systemd-readahe,readahead_t,auditctl_exec_t,file,write

audit2allow

#============= readahead_t ==============
allow readahead_t auditctl_exec_t:file write;

audit2allow -R

#============= readahead_t ==============
allow readahead_t auditctl_exec_t:file write;

Comment 1 satellitgo 2011-01-22 01:22:44 UTC
1 0f 66 bugs reported on boot up of soas x86-2110121 in Virtualbox4. 64 bit
I only reported this one on bugzilla

Soas only boots to openbox grey screen with right click menus
log out goes to Live User login screen
on login goes to same screen

Comment 2 Miroslav Grepl 2011-01-24 09:10:59 UTC

*** This bug has been marked as a duplicate of bug 669672 ***