Created attachment 914968 [details] Full dmesg output Description of problem: While booting I get a few AVCs that seem mostly related to asking for luks credentials. They show up in dmesg, but am having trouble getting sealert -b to see them. (Maybe I flagged them to delete a while back?) dmesg | grep -i avc [ 40.982877] audit: type=1400 audit(1404658663.388:3): avc: denied { getattr } for pid=772 comm="mdadm" path="/run/systemd/initctl/fifo" dev="tmpfs" ino=13456 scontext=system_u:system_r:mdadm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:init_var_run_t:s0 tclass=fifo_file permissive=1 [ 44.215112] audit: type=1400 audit(1404658666.621:4): avc: denied { search } for pid=901 comm="systemd-tty-ask" name="899" dev="proc" ino=16084 scontext=system_u:system_r:systemd_passwd_agent_t:s0 tcontext=system_u:system_r:lvm_t:s0 tclass=dir permissive=1 [ 44.235895] audit: type=1400 audit(1404658666.641:5): avc: denied { read } for pid=901 comm="systemd-tty-ask" name="stat" dev="proc" ino=16122 scontext=system_u:system_r:systemd_passwd_agent_t:s0 tcontext=system_u:system_r:lvm_t:s0 tclass=file permissive=1 [ 44.257339] audit: type=1400 audit(1404658666.663:6): avc: denied { open } for pid=901 comm="systemd-tty-ask" path="/proc/899/stat" dev="proc" ino=16122 scontext=system_u:system_r:systemd_passwd_agent_t:s0 tcontext=system_u:system_r:lvm_t:s0 tclass=file permissive=1 [ 44.279921] audit: type=1400 audit(1404658666.685:7): avc: denied { getattr } for pid=901 comm="systemd-tty-ask" path="/proc/899/stat" dev="proc" ino=16122 scontext=system_u:system_r:systemd_passwd_agent_t:s0 tcontext=system_u:system_r:lvm_t:s0 tclass=file permissive=1 [ 44.982905] audit: type=1400 audit(1404658667.387:8): avc: denied { write } for pid=899 comm="systemd-cryptse" scontext=system_u:system_r:lvm_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=socket permissive=1 [ 44.998639] audit: type=1400 audit(1404658667.404:9): avc: denied { read } for pid=899 comm="systemd-cryptse" scontext=system_u:system_r:lvm_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=socket permissive=1
Yes, we know about this kernel issue.
Miroslav, what is state of this bug?
This bug appears to have been reported against 'rawhide' during the Fedora 22 development cycle. Changing version to '22'. More information and reason for this action is here: https://fedoraproject.org/wiki/Fedora_Program_Management/HouseKeeping/Fedora22
I believe it has been already fixed.