Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 1066591

Summary: Adjust the /sys permissions to match kernel (should be 555) + wrong "/" permissions (should be 555)
Product: Red Hat Enterprise Linux 7 Reporter: Karel Volný <kvolny>
Component: filesystemAssignee: Ondrej Vasik <ovasik>
Status: CLOSED CURRENTRELEASE QA Contact: Jan Ščotka <jscotka>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 7.0CC: jmarko, jscotka, kvolny, ovasik
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: filesystem-3.2-17.el7 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
: 1149374 (view as bug list) Environment:
Last Closed: 2014-06-13 11:49:40 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1149374    

Description Karel Volný 2014-02-18 16:54:53 UTC
Description of problem:
https://tcms.engineering.redhat.com/run/114992/#caserun_4287234

Version-Release number of selected component (if applicable):
filesystem-3.2-16.el7

Actual results:
drwxr-xr-x. root root system_u:object_r:root_t:s0      /

Expected results:
dr-xr-xr-x. root root system_u:object_r:root_t:s0      /

Additional info:
see above, in RHEL6, root hadn't the u+w permission

and in addition, package verification fails both on / and /sys

.M.......    /
.M.......    /sys

Comment 1 Ondrej Vasik 2014-02-18 17:11:47 UTC
If package verification fails, it means some package changed the ownership after installation of the filesystem rpm. For the /sys , I believe https://bugzilla.redhat.com/show_bug.cgi?id=1037862 is the reason - kernel changed the permissions even for RHEL-7. Let's fix that one.

For "/" please do some investigation what is touching that dir. Ownership and mode in filesystem package is correct, however I can't force the other packages to not modify it later. As some pointers - does it occur even in minimal installation?

Comment 3 Ondrej Vasik 2014-02-28 08:09:58 UTC
Setting the blocker flag, Karel, please answer the questions and provide more information - otherwise I can't do much with it (555 for /sys is the thing I should change, but for / , I don't know what touches the root after the filesystem package installation - in the rpm it seems to be correct.

Comment 4 Karel Volný 2014-03-05 10:59:51 UTC
(In reply to Ondrej Vasik from comment #1)
> For "/" please do some investigation what is touching that dir. Ownership
> and mode in filesystem package is correct, however I can't force the other
> packages to not modify it later.

jmarko is working on improved version of the tool that watches changes between tests, so maybe we'll be able to catch something ...

> As some pointers - does it occur even in minimal installation?

I've just scheduled Beaker job with this one test separately (job id 605532)

however, we're running out of ideas, how to debug ... I believe it is not a packaging conflict, as nothing else seems to own / (but I'm not good in repoquery magic :-))

I was thinḱing about 'auditctl -w /' but man says:

"You cannot insert a watch to the top level directory. This is prohibited by the kernel."

... any other ideas?

Comment 5 Karel Volný 2014-03-05 11:01:50 UTC
(In reply to Karel Volný from comment #4)
> I've just scheduled Beaker job with this one test separately (job id 605532)

resubmitted as job 605585 because Beaker had old version of the test for some reason (previous tagging failed?)

Comment 6 Ondrej Vasik 2014-03-05 14:32:12 UTC
Package ownership is not necessary - I don't think some other package actually owns the / - but can do some black magic in %post/%postun scriptlets - some copying with parents or something like that - I actually did something like this with rootfiles in Fedora and /root, recently - so it might be completely unintentional.
Anyway - if you want to fix /sys permissions for 7.0 and defer the "/" issue investigation for 7.1, please grant the qa_ack ...

Comment 7 Karel Volný 2014-03-07 16:55:55 UTC
(In reply to Karel Volný from comment #5)
> resubmitted as job 605585 because Beaker had old version of the test for
> some reason (previous tagging failed?)

well, so it failed too ...

(In reply to Ondrej Vasik from comment #6)
> Anyway - if you want to fix /sys permissions for 7.0 and defer the "/" issue
> investigation for 7.1, please grant the qa_ack ...

ok, let's do at least /sys and investigate / later

Comment 12 Ludek Smid 2014-06-13 11:49:40 UTC
This request was resolved in Red Hat Enterprise Linux 7.0.

Contact your manager or support representative in case you have further questions about the request.