Description of problem: SELinux is preventing (networkd) from 'mounton' accesses on the directory /etc. ***** Plugin catchall_labels (83.8 confidence) suggests ******************* If you want to allow (networkd) to have mounton access on the etc directory Then sie müssen das Label auf /etc ändern Do # semanage fcontext -a -t FILE_TYPE '/etc' wobei FILE_TYPE einer der folgenen Werte ist: admin_home_t, anon_inodefs_t, audit_spool_t, auditd_log_t, autofs_t, automount_tmp_t, bacula_store_t, binfmt_misc_fs_t, boot_t, capifs_t, cgroup_t, cifs_t, debugfs_t, default_t, device_t, devpts_t, dnssec_t, dosfs_t, ecryptfs_t, efivarfs_t, fusefs_t, home_root_t, hugetlbfs_t, ifconfig_var_run_t, init_var_run_t, initrc_tmp_t, iso9660_t, kdbusfs_t, mail_spool_t, mnt_t, mqueue_spool_t, named_conf_t, news_spool_t, nfs_t, nfsd_fs_t, openshift_tmp_t, openshift_var_lib_t, oracleasmfs_t, proc_t, proc_xen_t, pstore_t, public_content_rw_t, public_content_t, ramfs_t, random_seed_t, removable_t, root_t, rpc_pipefs_t, security_t, spufs_t, src_t, svirt_sandbox_file_t, sysctl_fs_t, sysctl_t, sysfs_t, sysv_t, tmp_t, tmpfs_t, unlabeled_t, usbfs_t, user_home_dir_t, user_home_t, user_tmp_t, usr_t, var_lib_nfs_t, var_lib_t, var_lock_t, var_log_t, var_run_t, var_t, virt_image_t, virt_var_lib_t, vmblock_t, vxfs_t, xend_var_lib_t, xend_var_run_t, xenfs_t, xenstored_var_lib_t. Führen Sie danach Folgendes aus: restorecon -v '/etc' ***** Plugin catchall (17.1 confidence) suggests ************************** If sie denken, dass es (networkd) standardmässig erlaubt sein sollte, mounton Zugriff auf etc directory zu erhalten. Then sie sollten dies als Fehler melden. Um diesen Zugriff zu erlauben, können Sie ein lokales Richtlinien-Modul erstellen. Do zugriff jetzt erlauben, indem Sie die nachfolgenden Befehle ausführen: # grep (networkd) /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:init_t:s0 Target Context system_u:object_r:etc_t:s0 Target Objects /etc [ dir ] Source (networkd) Source Path (networkd) Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages filesystem-3.2-37.fc24.x86_64 Policy RPM selinux-policy-3.13.1-178.fc24.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 4.5.0-0.rc7.git0.2.fc24.x86_64 #1 SMP Tue Mar 8 02:20:08 UTC 2016 x86_64 x86_64 Alert Count 1 First Seen 2016-03-17 23:44:24 CET Last Seen 2016-03-17 23:44:24 CET Local ID a7076fcd-b5a1-48bf-9da9-b3326e768b05 Raw Audit Messages type=AVC msg=audit(1458254664.444:98): avc: denied { mounton } for pid=977 comm="(networkd)" path="/etc" dev="dm-2" ino=12 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=dir permissive=0 Hash: (networkd),init_t,etc_t,dir,mounton Version-Release number of selected component: selinux-policy-3.13.1-178.fc24.noarch Additional info: reporter: libreport-2.6.4 hashmarkername: setroubleshoot kernel: 4.5.0-0.rc7.git0.2.fc24.x86_64 type: libreport
*** Bug 1319369 has been marked as a duplicate of this bug. ***
*** This bug has been marked as a duplicate of bug 1317927 ***