Bug 1040444
Summary: | SELinux is preventing /usr/lib/systemd/systemd-hostnamed from using the 'dac_override' capabilities. | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Jan Sedlák <jsedlak> |
Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
Status: | CLOSED CURRENTRELEASE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 20 | CC: | dominick.grift, dwalsh, kparal, lvrabec, mgrepl, robatino |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Unspecified | ||
Whiteboard: | abrt_hash:f79b490581f756e062dbcbdd4c9f3b55e34e49d1f81ebf4eca2cb8700fc60dbb | ||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-12-16 15:42:06 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Jan Sedlák
2013-12-11 12:42:52 UTC
Description of problem: This appeared at the end of the installation on F20 TC5 Live x86_64 with http://vpodzime.fedorapeople.org/f20_blockers_updates.img used. Additional info: reporter: libreport-2.1.9 hashmarkername: setroubleshoot kernel: 3.11.10-300.fc20.x86_64 type: libreport This might violate "There must be no SELinux denial notifications or crash notifications on boot of or during installation from a release-blocking live image, or at first login after a default install of a release-blocking desktop. " unless it happens only when (certain) updates.img is used (and not without it). This usually means some file has the wrong ownership on it. If you can turn on full auditing and recreate the problem. We could diagnose this better. If you want to help identify if domain needs this access or you have a file with the wrong permissions on your system Then turn on full auditing to get path information about the offending file and generate the error again. Do Turn on full auditing # auditctl -w /etc/shadow -p w Try to recreate AVC. Then execute # ausearch -m avc -ts recent If you see PATH record check ownership/permissions on file, and fix it, otherwise report as a bugzilla. Of course it probably will only happen once. This does not happen with F20 RC1. It was probably caused by the updates.img. Removing blocker proposal. |