Description of problem: SELinux is preventing mkhomedir_helpe from 'write' accesses on the sock_file system_bus_socket. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that mkhomedir_helpe should be allowed write access on the system_bus_socket sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'mkhomedir_helpe' --raw | audit2allow -M my-mkhomedirhelpe # semodule -X 300 -i my-mkhomedirhelpe.pp Additional Information: Source Context unconfined_u:unconfined_r:oddjob_mkhomedir_t:s0-s0 :c0.c1023 Target Context system_u:object_r:system_dbusd_var_run_t:s0 Target Objects system_bus_socket [ sock_file ] Source mkhomedir_helpe Source Path mkhomedir_helpe Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.13.1-283.26.fc27.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 4.16.0-rc1-amd-vega+ #2 SMP Fri Mar 2 01:03:57 +05 2018 x86_64 x86_64 Alert Count 1 First Seen 2018-03-06 02:31:16 +05 Last Seen 2018-03-06 02:31:16 +05 Local ID 0db8fd83-33f9-4836-b8ab-0ae557744296 Raw Audit Messages type=AVC msg=audit(1520285476.726:632): avc: denied { write } for pid=31166 comm="mkhomedir_helpe" name="system_bus_socket" dev="tmpfs" ino=17171 scontext=unconfined_u:unconfined_r:oddjob_mkhomedir_t:s0-s0:c0.c1023 tcontext=system_u:object_r:system_dbusd_var_run_t:s0 tclass=sock_file permissive=0 Hash: mkhomedir_helpe,oddjob_mkhomedir_t,system_dbusd_var_run_t,sock_file,write Version-Release number of selected component: selinux-policy-3.13.1-283.26.fc27.noarch Additional info: component: selinux-policy reporter: libreport-2.9.3 hashmarkername: setroubleshoot kernel: 4.16.0-rc1-amd-vega+ type: libreport
Description of problem: Occured when i create user folder with `mkhomedir_helper` Version-Release number of selected component: selinux-policy-3.13.1-283.26.fc27.noarch Additional info: reporter: libreport-2.9.3 hashmarkername: setroubleshoot kernel: 4.16.0-rc1-amd-vega+ type: libreport
selinux-policy-3.13.1-283.27.fc27 has been submitted as an update to Fedora 27. https://bodhi.fedoraproject.org/updates/FEDORA-2018-32ebae3424
selinux-policy-3.13.1-283.27.fc27 has been pushed to the Fedora 27 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2018-32ebae3424
selinux-policy-3.13.1-283.28.fc27 has been submitted as an update to Fedora 27. https://bodhi.fedoraproject.org/updates/FEDORA-2018-32ebae3424
selinux-policy-3.13.1-283.28.fc27 has been pushed to the Fedora 27 testing repository. If problems still persist, please make note of it in this bug report. See https://fedoraproject.org/wiki/QA:Updates_Testing for instructions on how to install test updates. You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2018-32ebae3424
selinux-policy-3.13.1-283.28.fc27 has been pushed to the Fedora 27 stable repository. If problems still persist, please make note of it in this bug report.