Description of problem: SELinux is preventing /usr/bin/abrt-dump-journal-oops from 'write' accesses on the file /var/lib/abrt/abrt-dump-journal-oops.state. ***** Plugin catchall_labels (83.8 confidence) suggests ******************* If you want to allow abrt-dump-journal-oops to have write access on the abrt-dump-journal-oops.state file Then you need to change the label on /var/lib/abrt/abrt-dump-journal-oops.state Do # semanage fcontext -a -t FILE_TYPE '/var/lib/abrt/abrt-dump-journal-oops.state' where FILE_TYPE is one of the following: abrt_var_cache_t, afs_cache_t, initrc_tmp_t, puppet_tmp_t, user_cron_spool_t, user_tmp_t. Then execute: restorecon -v '/var/lib/abrt/abrt-dump-journal-oops.state' ***** Plugin catchall (17.1 confidence) suggests ************************** If you believe that abrt-dump-journal-oops should be allowed write access on the abrt-dump-journal-oops.state file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep abrt-dump-journ /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:abrt_dump_oops_t:s0 Target Context system_u:object_r:var_lib_t:s0 Target Objects /var/lib/abrt/abrt-dump-journal-oops.state [ file ] Source abrt-dump-journ Source Path /usr/bin/abrt-dump-journal-oops Port <Unknown> Host (removed) Source RPM Packages abrt-addon-kerneloops-2.2.2-4.fc21.x86_64 Target RPM Packages Policy RPM selinux-policy-3.13.1-68.fc21.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.16.0-0.rc7.git3.1.fc21.x86_64 #1 SMP Thu Jul 31 15:07:28 UTC 2014 x86_64 x86_64 Alert Count 10 First Seen 2014-08-02 13:12:27 CEST Last Seen 2014-08-03 06:12:15 CEST Local ID b8415433-5a78-4a41-a808-aec097fd5184 Raw Audit Messages type=AVC msg=audit(1407039135.667:408): avc: denied { write } for pid=652 comm="abrt-dump-journ" name="abrt-dump-journal-oops.state" dev="sda3" ino=304241 scontext=system_u:system_r:abrt_dump_oops_t:s0 tcontext=system_u:object_r:var_lib_t:s0 tclass=file permissive=0 type=SYSCALL msg=audit(1407039135.667:408): arch=x86_64 syscall=open success=no exit=EACCES a0=7ff0ca8a00c8 a1=20241 a2=180 a3=316431626666343d items=0 ppid=1 pid=652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=abrt-dump-journ exe=/usr/bin/abrt-dump-journal-oops subj=system_u:system_r:abrt_dump_oops_t:s0 key=(null) Hash: abrt-dump-journ,abrt_dump_oops_t,var_lib_t,file,write Version-Release number of selected component: selinux-policy-3.13.1-68.fc21.noarch Additional info: reporter: libreport-2.2.3 hashmarkername: setroubleshoot kernel: 3.16.0-0.rc7.git3.1.fc21.x86_64 type: libreport Potential duplicate: bug 1126089
*** This bug has been marked as a duplicate of bug 1126037 ***