Hide Forgot
May be transverse: https://bugzilla.redhat.com/show_bug.cgi?id=700559 SELinux is preventing /bin/systemd-tty-ask-password-agent from using the 'signull' accesses on a process. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that systemd-tty-ask-password-agent should be allowed signull access on processes labeled lvm_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep systemd-tty-ask /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:system_r:systemd_passwd_agent_t:s0 Target Context system_u:system_r:lvm_t:s0 Target Objects Unknown [ process ] Source systemd-tty-ask Source Path /bin/systemd-tty-ask-password-agent Port <Unknown> Host (removed) Source RPM Packages systemd-25-1.fc15 Target RPM Packages Policy RPM selinux-policy-3.9.16-16.fc15 Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux localhost 2.6.38.3-18.fc15.x86_64 #1 SMP Fri Apr 22 13:24:23 UTC 2011 x86_64 x86_64 Alert Count 2 First Seen Thu 28 Apr 2011 08:31:34 PM MSD Last Seen Thu 28 Apr 2011 08:41:57 PM MSD Local ID cc044d1b-1ce3-42e3-9aab-d7f56ea4b940 Raw Audit Messages type=AVC msg=audit(1304008917.897:1600): avc: denied { signull } for pid=32297 comm="systemd-tty-ask" scontext=unconfined_u:system_r:systemd_passwd_agent_t:s0 tcontext=system_u:system_r:lvm_t:s0 tclass=process type=SYSCALL msg=audit(1304008917.897:1600): arch=x86_64 syscall=kill success=yes exit=0 a0=7e02 a1=0 a2=4ff1a a3=3130313065633464 items=0 ppid=32296 pid=32297 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm=systemd-tty-ask exe=/bin/systemd-tty-ask-password-agent subj=unconfined_u:system_r:systemd_passwd_agent_t:s0 key=(null) Hash: systemd-tty-ask,systemd_passwd_agent_t,lvm_t,process,signull audit2allow #============= systemd_passwd_agent_t ============== allow systemd_passwd_agent_t lvm_t:process signull; audit2allow -R #============= systemd_passwd_agent_t ============== allow systemd_passwd_agent_t lvm_t:process signull;
I see this is fixed in the latest policy release which is available from updates-testing.