| Summary: | SELinux is preventing bash from 'create' accesses on the file important.log. | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | OoZooL <obliterator666> |
| Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
| Status: | CLOSED DUPLICATE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 23 | CC: | dominick.grift, dwalsh, lvrabec, mgrepl, plautrba |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Unspecified | ||
| Whiteboard: | abrt_hash:af817225c8dbe0e2b992cdf0d187a28c9b47a1cefefcf25e64e90ff087adcca8;VARIANT_ID=workstation; | ||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2016-04-18 14:09:48 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
*** This bug has been marked as a duplicate of bug 1327900 *** |
Description of problem: Someone there is ought to hate me, but this is again due to docker daemon under the root account home directory... SELinux is preventing bash from 'create' accesses on the file important.log. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that bash should be allowed create access on the important.log file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c bash --raw | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:svirt_lxc_net_t:s0:c101,c322 Target Context system_u:object_r:admin_home_t:s0 Target Objects important.log [ file ] Source bash Source Path bash Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.13.1-158.12.fc23.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 4.4.6-301.fc23.x86_64+debug #1 SMP Wed Mar 30 16:31:03 UTC 2016 x86_64 x86_64 Alert Count 1 First Seen 2016-04-17 20:56:01 IDT Last Seen 2016-04-17 20:56:01 IDT Local ID c5bb8edf-3511-4432-a59c-c9f963d2d68f Raw Audit Messages type=AVC msg=audit(1460915761.200:1121): avc: denied { create } for pid=19973 comm="bash" name="important.log" scontext=system_u:system_r:svirt_lxc_net_t:s0:c101,c322 tcontext=system_u:object_r:admin_home_t:s0 tclass=file permissive=0 Hash: bash,svirt_lxc_net_t,admin_home_t,file,create Version-Release number of selected component: selinux-policy-3.13.1-158.12.fc23.noarch Additional info: reporter: libreport-2.6.4 hashmarkername: setroubleshoot kernel: 4.4.6-301.fc23.x86_64+debug type: libreport