Bug 2046295 - SELinux is preventing coredumpctl from 'read' accesses on the file core.kwalletd5.1000.a024c174fb11458f8d6a7018f8a73647.1163.1643206776000000.zst.
Summary: SELinux is preventing coredumpctl from 'read' accesses on the file core.kwall...
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: rawhide
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Zdenek Pytela
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:b74b0983f8d68eae42e4cbe4dd4...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-01-26 14:29 UTC by Mr. Beedell, Roke Julian Lockhart (RJLB)
Modified: 2022-02-16 21:20 UTC (History)
9 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2022-01-26 14:51:46 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Mr. Beedell, Roke Julian Lockhart (RJLB) 2022-01-26 14:29:49 UTC
Description of problem:
Occurrence after initialisation of this computer.
SELinux is preventing coredumpctl from 'read' accesses on the file core.kwalletd5.1000.a024c174fb11458f8d6a7018f8a73647.1163.1643206776000000.zst.

*****  Plugin catchall (100. confidence) suggests   **************************

If you believe that coredumpctl should be allowed read access on the core.kwalletd5.1000.a024c174fb11458f8d6a7018f8a73647.1163.1643206776000000.zst file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'coredumpctl' --raw | audit2allow -M my-coredumpctl
# semodule -X 300 -i my-coredumpctl.pp

Additional Information:
Source Context                system_u:system_r:abrt_t:s0-s0:c0.c1023
Target Context                system_u:object_r:systemd_coredump_var_lib_t:s0
Target Objects                core.kwalletd5.1000.a024c174fb11458f8d6a7018f8a736
                              47.1163.1643206776000000.zst [ file ]
Source                        coredumpctl
Source Path                   coredumpctl
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           
Target RPM Packages           
SELinux Policy RPM            selinux-policy-targeted-35.11-1.fc36.noarch
Local Policy RPM              selinux-policy-targeted-35.11-1.fc36.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     (removed)
Platform                      Linux (removed) 5.17.0-
                              0.rc0.20220112gitdaadb3bd0e8d.63.fc36.x86_64 #1
                              SMP PREEMPT Wed Jan 12 18:54:57 UTC 2022 x86_64
                              x86_64
Alert Count                   7
First Seen                    2022-01-26 12:20:55 UTC
Last Seen                     2022-01-26 14:19:37 UTC
Local ID                      26d89570-7a28-443d-b3cc-d95d5ad4a931

Raw Audit Messages
type=AVC msg=audit(1643206777.913:276): avc:  denied  { read } for  pid=1288 comm="coredumpctl" name="core.kwalletd5.1000.a024c174fb11458f8d6a7018f8a73647.1163.1643206776000000.zst" dev="dm-0" ino=1406863 scontext=system_u:system_r:abrt_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_coredump_var_lib_t:s0 tclass=file permissive=0


Hash: coredumpctl,abrt_t,systemd_coredump_var_lib_t,file,read

Version-Release number of selected component:
selinux-policy-targeted-35.11-1.fc36.noarch

Additional info:
component:      selinux-policy
reporter:       libreport-2.16.0
hashmarkername: setroubleshoot
kernel:         5.17.0-0.rc0.20220112gitdaadb3bd0e8d.63.fc36.x86_64
type:           libreport

Comment 1 Zdenek Pytela 2022-01-26 14:51:46 UTC
Please turn on the following boolean for enabling the event scripts:

setsebool abrt_handle_event on

Comment 2 Mr. Beedell, Roke Julian Lockhart (RJLB) 2022-02-05 16:13:17 UTC
PS /> setsebool abrt_handle_event on
Could not change active booleans: Invalid boolean
PS /> sudo setsebool abrt_handle_event on
Could not change active booleans: Invalid boolean

Comment 3 Zdenek Pytela 2022-02-08 20:09:40 UTC
Are you running these commands as root? What is the output of:

$ getsebool abrt_handle_event
abrt_handle_event --> off

Comment 4 Mr. Beedell, Roke Julian Lockhart (RJLB) 2022-02-09 15:43:44 UTC
The command that was invoked by sudo was invoked as the superuser, whereas the command that was not invoked by sudo was not invoked as the superuser.

The consequence of 'getsebool abrt_handle_event' is:
'PS /> getsebool abrt_handle_event
/usr/sbin/getsebool:  SELinux is disabled'

SELinux is disabled because I disabled it after proding my previous response, but the consequence of invocation of 'setsebool abrt_handle_event on' is identical despite the opposite status of SELinux, so hopefully that is not important.

Comment 5 Sergei S. Rublёv 2022-02-16 11:42:29 UTC
Similar problem has been detected:

First reboot after installation of kernel 5.17.0-0.rc4.96.fc37 from rawhide

hashmarkername: setroubleshoot
kernel:         5.17.0-0.rc4.96.fc37.x86_64
package:        selinux-policy-targeted-36.2-1.fc37.noarch
reason:         SELinux is preventing coredumpctl from 'read' accesses on the file core.gutenprint53+us.0.52305d5ea1de4f56a557db1ddccdc829.2392.1645011521000000.zst.
type:           libreport

Comment 6 Sergei S. Rublёv 2022-02-16 21:20:28 UTC
Similar problem has been detected:

Strawberry fresh install at rawhide fc37 produces this

hashmarkername: setroubleshoot
kernel:         5.17.0-0.rc4.96.fc37.x86_64
package:        selinux-policy-targeted-36.2-1.fc37.noarch
reason:         SELinux is preventing coredumpctl from 'read' accesses on the file core.strawberry.1000.19c55a95b7fe4b599b2368f5b0cf3afd.5915.1645045888000000.zst.
type:           libreport


Note You need to log in before you can comment on or make changes to this bug.