Hide Forgot
Description of problem: This appeared after updating to selinux-policy.noarch 3.13.1-128.28.fc22. SELinux is preventing mkdir from 'write' accesses on the directory /. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that mkdir should be allowed write access on the directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep mkdir /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:system_mail_t:s0 Target Context system_u:object_r:root_t:s0 Target Objects / [ dir ] Source mkdir Source Path mkdir Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages filesystem-3.2-32.fc22.x86_64 Policy RPM selinux-policy-3.13.1-128.28.fc22.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 4.3.6-201.fc22.x86_64 #1 SMP Mon Feb 22 13:39:09 UTC 2016 x86_64 x86_64 Alert Count 302 First Seen 2015-07-14 10:28:07 EEST Last Seen 2016-02-29 12:22:04 EET Local ID 1a310fcb-56bf-4467-a644-41eb9d9d2069 Raw Audit Messages type=AVC msg=audit(1456741324.892:106): avc: denied { write } for pid=1332 comm="mkdir" name="/" dev="dm-2" ino=128 scontext=system_u:system_r:system_mail_t:s0 tcontext=system_u:object_r:root_t:s0 tclass=dir permissive=0 Hash: mkdir,system_mail_t,root_t,dir,write Version-Release number of selected component: selinux-policy-3.13.1-128.28.fc22.noarch Additional info: reporter: libreport-2.6.4 hashmarkername: setroubleshoot kernel: 4.3.6-201.fc22.x86_64 type: libreport Potential duplicate: bug 1046468
I also have gotten it: "SELinux is preventing mkdir from write access on the directory /. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that mkdir should be allowed write access on the directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep mkdir /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:system_mail_t:s0 Target Context system_u:object_r:root_t:s0 Target Objects / [ dir ] Source mkdir Source Path mkdir Port <Unknown> Host localhost.localdomain Source RPM Packages Target RPM Packages filesystem-3.2-32.fc22.x86_64 Policy RPM selinux-policy-3.13.1-128.28.fc22.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name localhost.localdomain Platform Linux localhost.localdomain 4.4.3-201.fc22.x86_64 #1 SMP Sat Feb 27 11:53:28 UTC 2016 x86_64 x86_64 Alert Count 25 First Seen 2016-03-03 23:00:19 EST Last Seen 2016-03-08 20:07:26 EST Local ID 910be9c8-be5b-4355-a7df-b04bb25848f8 Raw Audit Messages type=AVC msg=audit(1457485646.311:475): avc: denied { write } for pid=1485 comm="mkdir" name="/" dev="dm-1" ino=2 scontext=system_u:system_r:system_mail_t:s0 tcontext=system_u:object_r:root_t:s0 tclass=dir permissive=0 Hash: mkdir,system_mail_t,root_t,dir,write "
Fedora 22 changed to end-of-life (EOL) status on 2016-07-19. Fedora 22 is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of Fedora please feel free to reopen this bug against that version. If you are unable to reopen this bug, please file a new report against the current release. If you experience problems, please add a comment to this bug. Thank you for reporting this bug and we are sorry it could not be fixed.