Description of problem: SELinux is preventing gmain from 'watch' accesses on the directory /etc/gdm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that gmain should be allowed watch access on the gdm directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'gmain' --raw | audit2allow -M my-gmain # semodule -X 300 -i my-gmain.pp Additional Information: Source Context system_u:system_r:accountsd_t:s0 Target Context system_u:object_r:xdm_etc_t:s0 Target Objects /etc/gdm [ dir ] Source gmain Source Path gmain Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages gdm-3.38.2.1-2.fc34.x86_64 SELinux Policy RPM selinux-policy-targeted-3.14.8-1.fc35.noarch Local Policy RPM selinux-policy-targeted-3.14.8-1.fc35.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 5.11.0-0.rc7.20210212git291009f656 e8.151.fc35.x86_64 #1 SMP Fri Feb 12 13:02:28 UTC 2021 x86_64 x86_64 Alert Count 7 First Seen 2021-02-15 00:58:45 +05 Last Seen 2021-02-15 01:04:16 +05 Local ID 4a9d749f-a48c-4607-a0a4-91a5a7f2e7e6 Raw Audit Messages type=AVC msg=audit(1613333056.869:163): avc: denied { watch } for pid=1196 comm="accounts-daemon" path="/etc/gdm" dev="nvme0n1p2" ino=201326735 scontext=system_u:system_r:accountsd_t:s0 tcontext=system_u:object_r:xdm_etc_t:s0 tclass=dir permissive=1 Hash: gmain,accountsd_t,xdm_etc_t,dir,watch Version-Release number of selected component: selinux-policy-targeted-3.14.8-1.fc35.noarch Additional info: component: selinux-policy reporter: libreport-2.14.0 hashmarkername: setroubleshoot kernel: 5.11.0-0.rc7.20210212git291009f656e8.151.fc35.x86_64 type: libreport
Similar problem has been detected: Logged into GNOME. hashmarkername: setroubleshoot kernel: 5.11.0-0.rc7.20210212git291009f656e8.151.fc35.x86_64 package: selinux-policy-targeted-3.14.8-1.fc35.noarch reason: SELinux is preventing gmain from 'watch' accesses on the directory /etc/gdm. type: libreport
*** Bug 1928567 has been marked as a duplicate of this bug. ***
Hopefully this will be fixed soon.
Problem isolated: accountsd_t is able to manage files of the xdm_etc_t type, but not directories.
This is F34 problem too, perhaps candidate for CommonBugs tag?
I've submitted a Fedora PR to address the issue: https://github.com/fedora-selinux/selinux-policy/pull/613
*** Bug 1928565 has been marked as a duplicate of this bug. ***
*** Bug 1933687 has been marked as a duplicate of this bug. ***
Proposed as a Freeze Exception for 34-beta by Fedora user sgallagh using the blocker tracking app because: This is causing a significant performance issue as one CPU ends up running at 100% processing SELinux AVCs. It will leave a very bad impression on anyone trying out the Beta.
Discussed during the 2021-03-01 blocker review meeting: [0] The decision to classify this bug as an "AcceptedFreezeException (Beta)" was made as it is a noticeable issue that cannot be fixed with an update. [0] https://meetbot.fedoraproject.org/fedora-blocker-review/2021-03-01/f34-blocker-review.2021-03-01-17.01.txt
Similar problem has been detected: First boot after F34 upgrade. System has active sssd/freeipa. hashmarkername: setroubleshoot kernel: 5.10.19-200.fc33.x86_64 package: selinux-policy-targeted-3.14.7-22.fc34.noarch reason: SELinux is preventing accounts-daemon from 'watch' accesses on the directory /etc/gdm. type: libreport