On 07/16/2014 10:26 AM, Stephen Smalley wrote: > On 07/16/2014 10:21 AM, Stephen Smalley wrote: >> On 07/16/2014 10:16 AM, Stephen Smalley wrote: >>> On 07/15/2014 03:56 PM, Steve Lawrence wrote: >>>> On 07/14/2014 01:49 PM, Stephen Smalley wrote: >>>>> On 07/14/2014 01:12 PM, Steve Lawrence wrote: >>>>>> Ah, interesting. We saw that problem a long time ago, but couldn't >>>>>> reproduce it and it disappeared. Though I'm still unable to reproduce it >>>>>> following your steps. I can still login and seusers is labeled >>>>>> selinux_config_t. I'll keep looking into this. >>>>>> >>>>>> I've also rebased/pushed #integration onto #next. >>>>> >>>>> # Revert to stock F20 SELinux userspace and policy. >>>>> yum reinstall checkpolicy* libsepol* libsemanage* libselinux* >>>>> policycoreutils* selinux-policy-targeted >>>>> >>>>> # Clear prior source/CIL policy store. >>>>> rm -rf /var/lib/selinux >>>>> >>>>> # Reboot to ensure systemd and friends are using the new policy. >>>>> reboot >>>>> >>>>> # Reset selinux and cil to latest sources >>>>> cd selinux >>>>> git clean -fdx >>>>> git fetch origin >>>>> git reset --hard origin/integration >>>>> cd ../cil >>>>> git clean -fdx >>>>> git fetch origin >>>>> git reset --hard origin/master >>>>> >>>>> # Build and install new userspace >>>>> cd .. >>>>> ln -sf ../../cil selinux/libsepol/cil >>>>> make -C selinux LIBDIR=/usr/lib64 SHLIBDIR=/lib64 install install-pywrap >>>>> relabel >>>>> >>>>> # Convert >>>>> ./selinux/libsemanage/utils/semanage_migrate_etc_to_var.py >>>>> >>>>> Try to login on console or via ssh: Unable to get valid context for sds. >>>>> >>>>> dmesg | grep systemd >>>>> [ 343.739985] systemd[1]: SELinux policy denies access. >>>>> [ 348.256030] systemd[1]: SELinux policy denies access. >>>>> [ 376.335248] systemd[1]: SELinux policy denies access. >>>>> [ 376.515343] systemd[1]: SELinux policy denies access. >>>>> >>>>> restorecon -R /etc/selinux/targeted >>>>> >>>>> Try to login again, hangs for a long time before finally succeeding. >>>>> >>>>> reboot >>>>> >>>>> Everything is happy. >>>>> >>>>> 100% reproducible, every time. >>>>> >>>>> >>>> >>>> Thanks for the steps. I think I found what causes the labeling problem, >>>> but I'm not yet sure why. It looks like it has something to do with how >>>> the migration script rebuilds policy. If you run the migration script >>>> with the --norebuild flag, and then run semodule -B, everything is >>>> rebuilt and the files in /etc/selinux are labeled correctly. >>>> >>>> I'm not yet convinced this is the same problem as the systemd issue (I >>>> do get "unable to get valid context", but I still don't get "SELinux >>>> policy denies access"). Let me know if you still see that after using >>>> --norebuild/semodule -B. >>> >>> Ok, if I do: >>> ./libsemanage/utils/semanage_migrate_etc_to_var.py -n >>> semodule -B >>> >>> then /etc/selinux is labeled correctly and I can still login. >>> However, running su hangs and I get the systemd error message again. >> >> Also get this: >> ERROR:dbus.proxies:Introspect error on :1.4:/org/freedesktop/login1: >> dbus.exceptions.DBusException: org.freedesktop.DBus.Error.NoReply: Did >> not receive a reply. Possible causes include: the remote application did >> not send a reply, the message bus security policy blocked the reply, the >> reply timeout expired, or the network connection was broken. >> >> when trying to re-install the original selinux userspace packages. >> With more errors from systemd in dmesg, >> [14421.297045] systemd[1]: SELinux policy denies access. >> [14451.711732] systemd[1]: SELinux policy denies access. >> [14451.743787] systemd[1]: SELinux policy denies access. >> [14512.551210] systemd[1]: SELinux policy denies access. >> [14512.584126] systemd[1]: SELinux policy denies access. >> [14543.063872] systemd[1]: SELinux policy denies access. >> [14634.451680] systemd[1]: SELinux policy denies access. >> [14634.469813] systemd[1]: SELinux policy denies access. >> [14659.346867] systemd[1]: SELinux policy denies access. >> [14659.665108] systemd[1]: SELinux policy denies access. >> [14695.602174] systemd[1]: SELinux policy denies access. > > journalctl -r shows an additional error message for each of these denials: > systemd-logind[913]: Failed to query ActiveState: Access denied ausearch -m USER_AVC reports: type=USER_AVC msg=audit(1405520109.191:1031): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:init_t:s0 msg='avc: denied { status } for auid=-1 uid=-1 gid=-1 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=service exe="/usr/lib/systemd/systemd" sauid=0 hostname=? addr=? terminal=?' _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.