Description of problem: In enforcing mode, if boot / root fsck fails, it is not possible to continue into rescue mode by typing the root password: sulogin gets an avc error: audit(1078768449.589:0): avc: denied { read } for pid=228 exe=/sbin/sulogin name=shadow dev=dm-0 ino=131894 scontext=system_u:system_r:sysadm_t tcontext=system_u:object_r:shadow_t tclass=file and passwords are then rejected in an infinite cycle of: Give root password for maintenance (or type Control-D to continue): Login incorrect. Version-Release number of selected component (if applicable): rawhide-20040305 policy-1.7-8 How reproducible: 100% Steps to Reproduce: 1. Arrange for root fsck to fail (tweaking rc.sysinit may be the easiest way to force this on a test box) 2. Try to continue after the sulogin passwd prompt. Actual results: Root login impossible Expected results: Root passwd accepted.
Try 1.7-10
No luck: audit(1078822288.578:0): avc: denied { search } for pid=230 exe=/sbin/sulogin name=root dev=dm-0 ino=32769 scontext=system_u:system_r:system_chkpwd_t tcontext=system_u:object_r:sysadm_home_dir_t tclass=dir audit(1078822288.638:0): avc: denied { search } for pid=230 exe=/sbin/sulogin name=bin dev=dm-0 ino=409601 scontext=system_u:system_r:system_chkpwd_t tcontext=system_u:object_r:bin_t tclass=dir audit(1078822288.695:0): avc: denied { search } for pid=230 exe=/sbin/sulogin name=bin dev=dm-0 ino=409601 scontext=system_u:system_r:system_chkpwd_t tcontext=system_u:object_r:bin_t tclass=dir No other avc errors appear. Works fine with enforcing=0.
Fixed in policy-1.9-1
closing.