Description of problem: When logging in as a user who doesn't have home dir oddjob-mkhomedir fails due to AVC. The following is logged in messages/secure/audit.log during the login attempt: type=SERVICE_START msg=audit(1334752405.315:281): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg=' comm="getty@tty5" exe="/usr/lib/systemd/syste md" hostname=? addr=? terminal=? res=success' ==> /var/log/secure <== Apr 18 15:33:29 localhost login: pam_unix(login:auth): authentication failure; logname=LOGIN uid=0 euid=0 tty=tty5 ruser= rhost= user=testuser ==> /var/log/audit/audit.log <== type=USER_AUTH msg=audit(1334752410.808:282): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:local_login_t:s0-s0:c0.c1023 msg='op=PAM:authentication acct="tes tuser" exe="/usr/bin/login" hostname=? addr=? terminal=tty5 res=success' ==> /var/log/secure <== Apr 18 15:33:30 localhost login: pam_sss(login:auth): User info message: Your password will expire in 5 day(s). Apr 18 15:33:30 localhost login: pam_sss(login:auth): authentication success; logname=LOGIN uid=0 euid=0 tty=tty5 ruser= rhost= user=testuser ==> /var/log/audit/audit.log <== type=USER_ACCT msg=audit(1334752410.809:283): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:local_login_t:s0-s0:c0.c1023 msg='op=PAM:accounting acct="testuser" exe="/usr/bin/login" hostname=? addr=? terminal=tty5 res=success' type=CRED_ACQ msg=audit(1334752410.811:284): pid=0 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:local_login_t:s0-s0:c0.c1023 msg='op=PAM:setcred acct="testuser" exe="/usr/bin/login" hostname=? addr=? terminal=tty5 res=success' type=LOGIN msg=audit(1334752410.811:285): login pid=1282 uid=0 old auid=4294967295 new auid=10305353 old ses=4294967295 new ses=3 type=USER_ROLE_CHANGE msg=audit(1334752410.855:286): pid=0 uid=0 auid=10305353 ses=3 subj=system_u:system_r:local_login_t:s0-s0:c0.c1023 msg='pam: default-context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 selected-context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 exe="/usr/bin/login" hostname=? addr=? terminal=tty5 res=success' ==> /var/log/messages <== Apr 18 15:33:30 localhost systemd-logind[602]: New session 3 of user testuser. ==> /var/log/audit/audit.log <== type=AVC msg=audit(1334752410.882:287): avc: denied { read } for pid=1007 comm="oddjobd" name="passwd" dev="dm-1" ino=1312501 scontext=system_u:system_r:oddjob_t:s0-s0:c0.c1023 tcontext=system_u:object_r:passwd_file_t:s0 tclass=file type=SYSCALL msg=audit(1334752410.882:287): arch=c000003e syscall=2 success=no exit=-13 a0=7fba3b0606ca a1=80000 a2=1b6 a3=238 items=0 ppid=1 pid=1007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="oddjobd" exe="/usr/sbin/oddjobd" subj=system_u:system_r:oddjob_t:s0-s0:c0.c1023 key=(null) type=AVC msg=audit(1334752410.882:288): avc: denied { search } for pid=1007 comm="oddjobd" name="sss" dev="dm-1" ino=138292 scontext=system_u:system_r:oddjob_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sssd_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1334752410.882:288): arch=c000003e syscall=42 success=no exit=-13 a0=4 a1=7fff71a80380 a2=6e a3=7fff71a80040 items=0 ppid=1 pid=1007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="oddjobd" exe="/usr/sbin/oddjobd" subj=system_u:system_r:oddjob_t:s0-s0:c0.c1023 key=(null) ==> /var/log/secure <== Apr 18 15:33:30 localhost login: pam_unix(login:session): session opened for user testuser by LOGIN(uid=0) ==> /var/log/audit/audit.log <== type=USER_START msg=audit(1334752410.883:289): pid=0 uid=0 auid=10305353 ses=3 subj=system_u:system_r:local_login_t:s0-s0:c0.c1023 msg='op=PAM:session_open acct="testuser" exe="/usr/bin/login" hostname=? addr=? terminal=tty5 res=success' type=CRED_REFR msg=audit(1334752410.884:290): pid=0 uid=0 auid=10305353 ses=3 subj=system_u:system_r:local_login_t:s0-s0:c0.c1023 msg='op=PAM:setcred acct="testuser" exe="/usr/bin/login" hostname=? addr=? terminal=tty5 res=success' type=USER_LOGIN msg=audit(1334752410.884:291): pid=0 uid=0 auid=10305353 ses=3 subj=system_u:system_r:local_login_t:s0-s0:c0.c1023 msg='op=login id=10305353 exe="/usr/bin/login" hostname=? addr=? terminal=tty5 res=success' ==> /var/log/secure <== Apr 18 15:33:30 localhost login: LOGIN ON tty5 BY testuser ==> /var/log/messages <== Apr 18 15:33:31 localhost dbus-daemon[624]: ** Message: No devices in use, exit And the following is printed in the login prompt for the user: com.redhat.oddjob.Error.UnknownUser: UID=0 Last login: Wed Apr 18 15:29:51 on tty5 -- testuser: /home/testuser: change directory failed: No such file or directory Logging in with home = "/". Version-Release number of selected component (if applicable): Fedora 17 Beta
Also ran into this when using Active Directory. Three alerts. Running 'restorecon' on the relevant directories showed nothing. ALERT 1: SELinux is preventing /usr/sbin/oddjobd from read access on the file /etc/passwd. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that oddjobd should be allowed read access on the passwd file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep oddjobd /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:oddjob_t:s0-s0:c0.c1023 Target Context system_u:object_r:passwd_file_t:s0 Target Objects /etc/passwd [ file ] Source oddjobd Source Path /usr/sbin/oddjobd Port <Unknown> Host stef-desktop.thewalter.lan Source RPM Packages oddjob-0.31.1-2.fc17.x86_64 Target RPM Packages setup-2.8.48-1.fc17.noarch Policy RPM selinux-policy-3.10.0-110.fc17.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name stef-desktop.thewalter.lan Platform Linux stef-desktop.thewalter.lan 3.3.1-5.fc17.x86_64 #1 SMP Tue Apr 10 20:42:28 UTC 2012 x86_64 x86_64 Alert Count 1 First Seen Fri 20 Apr 2012 05:10:30 PM CEST Last Seen Fri 20 Apr 2012 05:10:30 PM CEST Local ID f7bf2783-d607-4a88-939d-879380e53d07 Raw Audit Messages type=AVC msg=audit(1334934630.835:1429): avc: denied { read } for pid=15305 comm="oddjobd" name="passwd" dev="sda1" ino=178678 scontext=system_u:system_r:oddjob_t:s0-s0:c0.c1023 tcontext=system_u:object_r:passwd_file_t:s0 tclass=file type=SYSCALL msg=audit(1334934630.835:1429): arch=x86_64 syscall=open success=no exit=EACCES a0=7f8a5f2996ca a1=80000 a2=1b6 a3=238 items=0 ppid=1 pid=15305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=oddjobd exe=/usr/sbin/oddjobd subj=system_u:system_r:oddjob_t:s0-s0:c0.c1023 key=(null) Hash: oddjobd,oddjob_t,passwd_file_t,file,read audit2allowunable to open /sys/fs/selinux/policy: Permission denied audit2allow -Runable to open /sys/fs/selinux/policy: Permission denied ALERT 2: SELinux is preventing /usr/sbin/oddjobd from search access on the directory /var/lib/sss. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that oddjobd should be allowed search access on the sss directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep oddjobd /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:oddjob_t:s0-s0:c0.c1023 Target Context system_u:object_r:sssd_var_lib_t:s0 Target Objects /var/lib/sss [ dir ] Source oddjobd Source Path /usr/sbin/oddjobd Port <Unknown> Host stef-desktop.thewalter.lan Source RPM Packages oddjob-0.31.1-2.fc17.x86_64 Target RPM Packages sssd-1.8.2-10.fc17.x86_64 Policy RPM selinux-policy-3.10.0-110.fc17.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name stef-desktop.thewalter.lan Platform Linux stef-desktop.thewalter.lan 3.3.1-5.fc17.x86_64 #1 SMP Tue Apr 10 20:42:28 UTC 2012 x86_64 x86_64 Alert Count 1 First Seen Fri 20 Apr 2012 05:10:30 PM CEST Last Seen Fri 20 Apr 2012 05:10:30 PM CEST Local ID fcde642a-9ddc-49fe-adfc-407030067fa5 Raw Audit Messages type=AVC msg=audit(1334934630.835:1430): avc: denied { search } for pid=15305 comm="oddjobd" name="sss" dev="sda1" ino=20905 scontext=system_u:system_r:oddjob_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sssd_var_lib_t:s0 tclass=dir type=SYSCALL msg=audit(1334934630.835:1430): arch=x86_64 syscall=connect success=no exit=EACCES a0=4 a1=7fffc4d1c5a0 a2=6e a3=238 items=0 ppid=1 pid=15305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=oddjobd exe=/usr/sbin/oddjobd subj=system_u:system_r:oddjob_t:s0-s0:c0.c1023 key=(null) Hash: oddjobd,oddjob_t,sssd_var_lib_t,dir,search audit2allowunable to open /sys/fs/selinux/policy: Permission denied audit2allow -Runable to open /sys/fs/selinux/policy: Permission denied ALERT 3: SELinux is preventing /usr/sbin/oddjobd from getattr access on the directory /run/winbindd. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that oddjobd should be allowed getattr access on the winbindd directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep oddjobd /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:oddjob_t:s0-s0:c0.c1023 Target Context unconfined_u:object_r:winbind_var_run_t:s0 Target Objects /run/winbindd [ dir ] Source oddjobd Source Path /usr/sbin/oddjobd Port <Unknown> Host stef-desktop.thewalter.lan Source RPM Packages oddjob-0.31.1-2.fc17.x86_64 Target RPM Packages samba-winbind-3.6.4-82.fc17.1.x86_64 Policy RPM selinux-policy-3.10.0-110.fc17.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name stef-desktop.thewalter.lan Platform Linux stef-desktop.thewalter.lan 3.3.1-5.fc17.x86_64 #1 SMP Tue Apr 10 20:42:28 UTC 2012 x86_64 x86_64 Alert Count 1 First Seen Fri 20 Apr 2012 05:10:30 PM CEST Last Seen Fri 20 Apr 2012 05:10:30 PM CEST Local ID 468c34b7-8a26-4b0b-9faa-378fb9370c64 Raw Audit Messages type=AVC msg=audit(1334934630.836:1431): avc: denied { getattr } for pid=15305 comm="oddjobd" path="/run/winbindd" dev="tmpfs" ino=13334221 scontext=system_u:system_r:oddjob_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:winbind_var_run_t:s0 tclass=dir type=SYSCALL msg=audit(1334934630.836:1431): arch=x86_64 syscall=lstat success=no exit=EACCES a0=7f8a5ee81aac a1=7fffc4d19e60 a2=7fffc4d19e60 a3=238 items=0 ppid=1 pid=15305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=oddjobd exe=/usr/sbin/oddjobd subj=system_u:system_r:oddjob_t:s0-s0:c0.c1023 key=(null) Hash: oddjobd,oddjob_t,winbind_var_run_t,dir,getattr audit2allowunable to open /sys/fs/selinux/policy: Permission denied audit2allow -Runable to open /sys/fs/selinux/policy: Permission denied
Fixed in selinux-policy-3.10.0-117.fc17.noarch
selinux-policy-3.10.0-117.fc17 has been submitted as an update for Fedora 17. https://admin.fedoraproject.org/updates/selinux-policy-3.10.0-117.fc17
Confirmed, selinux-policy-3.10.0-117.fc17.noarch fixes the issue. Thanks!
Thanks for testing. Could you give karma.
Gave karma already.
selinux-policy-3.10.0-118.fc17 has been submitted as an update for Fedora 17. https://admin.fedoraproject.org/updates/selinux-policy-3.10.0-118.fc17
Package selinux-policy-3.10.0-118.fc17: * should fix your issue, * was pushed to the Fedora 17 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.10.0-118.fc17' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2012-6452/selinux-policy-3.10.0-118.fc17 then log in and leave karma (feedback).
selinux-policy-3.10.0-118.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.