Description of problem: SELinux is preventing /usr/bin/bash from 'write' accesses on the file . ***** Plugin catchall (100. confidence) suggests ************************** If você acredita que o bash deva ser permitido acesso de write em file por default. Then você precisa reportar este como um erro. Você pode gerar um módulo de política local para permitir este acesso. Do permitir este acesso agora executando: # grep laptop_mode /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:apmd_t:s0 Target Context system_u:object_r:var_lock_t:s0 Target Objects [ file ] Source laptop_mode Source Path /usr/bin/bash Port <Unknown> Host (removed) Source RPM Packages bash-4.2.47-3.fc20.x86_64 Target RPM Packages Policy RPM selinux-policy-3.12.1-183.fc20.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.16.2-200.fc20.x86_64 #1 SMP Mon Sep 8 11:54:45 UTC 2014 x86_64 x86_64 Alert Count 7 First Seen 2014-09-20 21:57:51 BRT Last Seen 2014-09-20 21:59:52 BRT Local ID 5f0c56fd-55e7-46be-9573-ba75d4aacddc Raw Audit Messages type=AVC msg=audit(1411261192.674:418): avc: denied { write } for pid=3917 comm="laptop_mode" name="lmt-req.lock" dev="tmpfs" ino=17647 scontext=system_u:system_r:apmd_t:s0 tcontext=system_u:object_r:var_lock_t:s0 tclass=file permissive=0 type=SYSCALL msg=audit(1411261192.674:418): arch=x86_64 syscall=open success=no exit=EACCES a0=dcfa60 a1=201 a2=1b6 a3=1 items=0 ppid=3915 pid=3917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=laptop_mode exe=/usr/bin/bash subj=system_u:system_r:apmd_t:s0 key=(null) Hash: laptop_mode,apmd_t,var_lock_t,file,write Additional info: reporter: libreport-2.2.3 hashmarkername: setroubleshoot kernel: 3.16.2-200.fc20.x86_64 type: libreport Potential duplicate: bug 1016831
*** This bug has been marked as a duplicate of bug 1016831 ***