Description of problem: Appears on boot of current Rawhide Workstation live with enforcing=0 . If you attempt to boot without enforcing=0, the system never reaches the desktop. There are 3 other alerts, not sure which is the critical one. SELinux is preventing accounts-daemon from 'add_name' accesses on the directory .cache. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that accounts-daemon should be allowed add_name access on the .cache directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'accounts-daemon' --raw | audit2allow -M my-accountsdaemon # semodule -X 300 -i my-accountsdaemon.pp Additional Information: Source Context system_u:system_r:accountsd_t:s0 Target Context system_u:object_r:admin_home_t:s0 Target Objects .cache [ dir ] Source accounts-daemon Source Path accounts-daemon Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.13.1-194.fc25.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 4.7.0-0.rc2.git1.1.fc25.x86_64 #1 SMP Tue Jun 7 13:28:43 UTC 2016 x86_64 x86_64 Alert Count 1 First Seen 2016-06-08 21:11:54 EDT Last Seen 2016-06-08 21:11:54 EDT Local ID 742f4d45-5818-488e-9a88-b83ea1b9dc49 Raw Audit Messages type=AVC msg=audit(1465434714.252:97): avc: denied { add_name } for pid=989 comm="accounts-daemon" name=".cache" scontext=system_u:system_r:accountsd_t:s0 tcontext=system_u:object_r:admin_home_t:s0 tclass=dir permissive=1 Hash: accounts-daemon,accountsd_t,admin_home_t,dir,add_name Version-Release number of selected component: selinux-policy-3.13.1-194.fc25.noarch Additional info: reporter: libreport-2.7.1 hashmarkername: setroubleshoot kernel: 4.7.0-0.rc2.git1.1.fc25.x86_64 reproducible: Not sure how to reproduce the problem type: libreport
Closing due to: https://bugzilla.redhat.com/show_bug.cgi?id=1342732