Description of problem: Happened while starting gparted; querying devices SELinux is preventing /usr/sbin/mdadm from using the 'signull' accesses on a process. ***** Plugin catchall (100. confidence) suggests ************************** If je denkt dat mdadm standaard signull toegang moet hebben tot processen gelabeld met kernel_t. Then je moet dit melden als een fout. Je kunt een locale tactiek module genereren om deze toegang toe te staan. Do sta deze toegang nu toe door het uitvoeren van: # grep mdadm /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:mdadm_t:s0-s0:c0.c1023 Target Context system_u:system_r:kernel_t:s0 Target Objects [ process ] Source mdadm Source Path /usr/sbin/mdadm Port <Unknown> Host (removed) Source RPM Packages mdadm-3.3-7.fc20.x86_64 Target RPM Packages Policy RPM selinux-policy-3.12.1-180.fc20.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.17.0-0.rc0.git6.1.fc22.x86_64 #1 SMP Fri Aug 15 13:43:35 UTC 2014 x86_64 x86_64 Alert Count 1 First Seen 2014-08-18 22:24:17 CEST Last Seen 2014-08-18 22:24:17 CEST Local ID fa2040f0-1a66-4cbf-a294-5571e9945576 Raw Audit Messages type=AVC msg=audit(1408393457.478:476): avc: denied { signull } for pid=5418 comm="mdadm" scontext=system_u:system_r:mdadm_t:s0-s0:c0.c1023 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=0 type=SYSCALL msg=audit(1408393457.478:476): arch=x86_64 syscall=kill success=no exit=EACCES a0=15f a1=0 a2=a a3=15f items=0 ppid=5417 pid=5418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=mdadm exe=/usr/sbin/mdadm subj=system_u:system_r:mdadm_t:s0-s0:c0.c1023 key=(null) Hash: mdadm,mdadm_t,kernel_t,process,signull Additional info: reporter: libreport-2.2.3 hashmarkername: setroubleshoot kernel: 3.17.0-0.rc0.git6.1.fc22.x86_64 type: libreport
commit 510f5fa8ea5ff6f2f6bc102aa6a496e6058607cf Author: Miroslav Grepl <mgrepl> Date: Tue Aug 19 15:38:24 2014 +0200 Allow mdadm to seng signull kernel_t which is proces type of mdadm on early boot.
selinux-policy-3.12.1-181.fc20 has been submitted as an update for Fedora 20. https://admin.fedoraproject.org/updates/selinux-policy-3.12.1-181.fc20
Package selinux-policy-3.12.1-181.fc20: * should fix your issue, * was pushed to the Fedora 20 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.12.1-181.fc20' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2014-9682/selinux-policy-3.12.1-181.fc20 then log in and leave karma (feedback).
selinux-policy-3.12.1-181.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.