Hello all,
I’m seeing SELinux denials for system processes and files which are part of the read-only deployment - but only on a single machine. Since I’m running out of ideas I’d like to continue here.
For now I’m running this system in Permissive mode which I’d like to avoid.
If running on Enforced, setroubleshoot shows:
SELinux is preventing (-localed) from remount access on the filesystem which let’s localed.service fail and all apps relying on it.
setroubleshoot is suggesting a device relabel, which is not possible on SB.
The full setroubleshoot log is showing system_u:object_r:unlabeled_t. May this be the main culprit?
I’ve already tried running with a clean (reset) deployment. Only nvidia packages from RPMFusion enabled as this is required to boot my system without success.
The full setroubleshoot log:
SELinux is preventing (-localed) from remount access on the filesystem .
***** Plugin file (73.6 confidence) suggests ******************************
If you think this is caused by a badly mislabeled machine.
Then you need to fully relabel.
Do
touch /.autorelabel; reboot
***** Plugin file (73.6 confidence) suggests ******************************
If you think this is caused by a badly mislabeled machine.
Then you need to fully relabel.
Do
touch /.autorelabel; reboot
***** Plugin catchall (2.93 confidence) suggests **************************
If you believe that (-localed) should be allowed remount access on the filesystem by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c '(-localed)' --raw | audit2allow -M my-localed
# semodule -X 300 -i my-localed.pp
Additional Information:
Source Context system_u:system_r:init_t:s0
Target Context system_u:object_r:unlabeled_t:s0
Target Objects [ filesystem ]
Source (-localed)
Source Path (-localed)
Port <Unknown>
Host mershl-desktop
Source RPM Packages
Target RPM Packages
SELinux Policy RPM selinux-policy-targeted-3.14.5-43.fc32.noarch
Local Policy RPM
Selinux Enabled True
Policy Type targeted
Enforcing Mode Permissive
Host Name mershl-desktop
Platform Linux mershl-desktop 5.8.4-200.fc32.x86_64 #1 SMP
Wed Aug 26 22:28:08 UTC 2020 x86_64 x86_64
Alert Count 16
First Seen 2020-08-11 21:01:55 CEST
Last Seen 2020-09-02 00:45:41 CEST
Local ID 05458b08-18d2-4ec6-b113-2e7aa0ce0756
Raw Audit Messages
type=AVC msg=audit(1599000341.724:236): avc: denied { remount } for pid=6985 comm="(ostnamed)" scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1
Hash: (-localed),init_t,unlabeled_t,filesystem,remount