Description of problem: SELinux is preventing systemd-tmpfile from using the 'dac_read_search' capabilities. ***** Plugin dac_override (91.4 confidence) suggests ********************** If si vuole aiutare ad identificare se al dominio serva questo accesso o se si possiede un file con i permessi sbagliati sul sistema Then attivare l'auditing completo per ottenere le informazioni del percorso del file incriminato e generare nuovamente l'errore. Do Attivare il controllo completo auditing # auditctl -w /etc/shadow -p w Provare a ricreare AVC. Eseguire quindi # ausearch -m avc -ts recent Qualora si noti il record PATH, controllare la proprietà/i permessi sul file e correggerli, altrimenti registrare un bugzilla. ***** Plugin catchall (9.59 confidence) suggests ************************** If si pensa che systemd-tmpfile dovrebbe avere funzionalità dac_read_search in modo predefinito. Then si dovrebbe riportare il problema come bug. E' possibile generare un modulo di politica locale per consentire questo accesso. Do allow this access for now by executing: # ausearch -c 'systemd-tmpfile' --raw | audit2allow -M my-systemdtmpfile # semodule -X 300 -i my-systemdtmpfile.pp Additional Information: Source Context system_u:system_r:systemd_tmpfiles_t:s0 Target Context system_u:system_r:systemd_tmpfiles_t:s0 Target Objects Unknown [ capability ] Source systemd-tmpfile Source Path systemd-tmpfile Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.13.1-253.fc27.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 4.12.0-0.rc0.git9.1.fc27.x86_64 #1 SMP Sat May 13 13:39:12 UTC 2017 x86_64 x86_64 Alert Count 4 First Seen 2017-05-16 07:57:50 CEST Last Seen 2017-05-16 07:57:50 CEST Local ID b1fe3c04-6aae-453d-97ac-9a8097a9badb Raw Audit Messages type=AVC msg=audit(1494914270.576:4257): avc: denied { dac_read_search } for pid=8761 comm="systemd-tmpfile" capability=2 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:system_r:systemd_tmpfiles_t:s0 tclass=capability permissive=0 Hash: systemd-tmpfile,systemd_tmpfiles_t,systemd_tmpfiles_t,capability,dac_read_search Version-Release number of selected component: selinux-policy-3.13.1-253.fc27.noarch Additional info: component: selinux-policy reporter: libreport-2.9.1 hashmarkername: setroubleshoot kernel: 4.12.0-0.rc0.git9.1.fc27.x86_64 type: libreport
Description of problem: This is a fresh rawhide installation upgraded from a fresh f25 installation using the dnf upgrade plugin I was told in IRC the issue is due to a kernel change where the order of dac_read_search and dac_override changed to fix check dac_read_search Version-Release number of selected component: selinux-policy-3.13.1-255.fc27.noarch Additional info: reporter: libreport-2.9.1 hashmarkername: setroubleshoot kernel: 4.12.0-0.rc3.git0.2.fc27.x86_64 type: libreport
Description of problem: Happens on first boot of a current Rawhide Workstation install. Version-Release number of selected component: selinux-policy-3.13.1-258.fc27.noarch Additional info: reporter: libreport-2.9.1 hashmarkername: setroubleshoot kernel: 4.12.0-0.rc5.git2.1.fc27.x86_64 type: libreport
This is clearly not fixed. Also clearly similar to #1451377, #1451379, #1459081 and #1451381, but not the same (five different things, all hitting the same denial). Proposing as an F27 Final blocker: "There must be no SELinux denial notifications or crash notifications on boot of or during installation from a release-blocking live image, or at first login after a default install of a release-blocking desktop."
Description of problem: Installing Workstation Live, circa at the end Version-Release number of selected component: selinux-policy-3.13.1-265.fc27.noarch Additional info: reporter: libreport-2.9.1 hashmarkername: setroubleshoot kernel: 4.13.0-0.rc1.git3.1.fc27.x86_64 type: libreport
This bug appears to have been reported against 'rawhide' during the Fedora 27 development cycle. Changing version to '27'.
Discussed during blocker review [1]: AcceptedBlocker (Final) - clear violations of Final criterion "There must be no SELinux denial notifications or crash notifications on boot of or during installation from a release-blocking live image, or at first login after a default install of a release-blocking desktop." [1] https://meetbot-raw.fedoraproject.org/fedora-blocker-review/2017-08-21/
# audit2allow -i avc #============= systemd_tmpfiles_t ============== #!!!! This avc is allowed in the current policy allow systemd_tmpfiles_t self:capability dac_read_search; # sesearch -A -s systemd_tmpfiles_t -t systemd_tmpfiles_t -c capability -p dac_read_search allow systemd_tmpfiles_t systemd_tmpfiles_t:capability { chown dac_override *dac_read_search* fowner fsetid mknod sys_admin }; # rpm -q selinux-policy selinux-policy-3.13.1-273.fc27.noarch This is fixed in the latest selinux-policy build in koji.