On Fri, Aug 8, 2008 at 10:19 AM, Mike Edenfield <kutulu@xxxxxxxxxx> wrote: > Paul Moore wrote: >> >> On Friday 08 August 2008 11:46:23 am Mike Edenfield wrote: >>> >>> The reason I strongly suspect SELinux is the problem (or at least a >>> major factor), is that adding "selinux=0" to my boot command line >>> corrects the problem, and the system boots fine. Everything appears >>> to be installed and configured correctly, except obviously SELinux is >>> now disabled. The filesystems are all labeled correctly, and even on >>> the failing boot the AVC messages display the correct labels, like >>> tty_device_t and urandom_device_t. >> >> Hi Mike, >> >> In general, you are better off using "enforcing=0", which keeps SELinux >> enabled but puts it into permissive mode, on the kernel command line instead >> of "selinux=0", which disables SELinux entirely. Have you tried rebooting >> with "enforcing=0" and capturing the AVC messages from the >> console/audit/syslog output and seeing if anything looks awry? If not go >> ahead and do so and send them to the list, this will tell us what actions >> are being denied and why. > > I have SELinux configured for permissive mode to begin with, but I tried > adding "enforcing=0" to the boot command line to no effect. Here are the > denials I am getting: > > (transcribed by hand since neither syslog nor auditd are starting) > > avc: denied { execute_no_trans } for pid=1 comm="init" path="/sbin/init" > dev=sda3 ino=920038 scontext=system_u:system_r:kernel_t > tcontext=system_u:object_r:file_t tclass=file > avc: denied { read } for pid=1 comm="init" name="ld-linux.so.2" dev=sda3 > ino=1785880 scontext=system_u:system_r:kernel_t > tcontext=system_u:object_r:file_t tclass=lnk_file > avc: denied { getattr } for pid=1 comm="init" path="/etc/ld.so.cache" > dev=sda3 ino=1090186 scontext=system_u:system_r:kernel_t > tcontext=system_t:object_r:file_t tclass=file > avc: denied { read } for pid=1 comm="init" name="udanrom" dev=sda3 > ino=126002 scontext=system_u:system_r:kernel_t > tcontext=system_u:object_r:urandom_device_t tclass=chr_file > avc: denied { getattr } for pid=1 comm="init" name="/" dev=selinuxfs ino=1 > scontext=system_u:system_r:kernel_t tcontext=system_t:object_r:security_t > tclass=filesystem > avc: denied { read write } for pid=1 comm="init" name="tty0" dev=sda3 > ino=126327 scontext=system_u:system_r:kernel_t > tcontext=system_u:object_r:tty_device_t tclass=chr_file > > > There are apparently a lot of the latter since I usually get a message that > printk is supressing several dozen messages at this point, then I get no > more AVC's on the console. > > > Thanks, > > --Mike > > -- > This message was distributed to subscribers of the selinux mailing list. > If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx > with > the words "unsubscribe selinux" without quotes as the message. > you can use echo 0 > /proc/sys/kernel/printk_ratelimit or add= kernel.printk_ratelimit=0 to /etc/sysctl.conf this way you see all of the messages, just remember to put it back to 5 when finished, so you don't become vulnerable to a buffer attack. regards; -- Justin P. Mattock -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.