Description of problem: SELinux is preventing nfsidmap from 'write' accesses on the sock_file io.systemd.DynamicUser. ***** Plugin catchall (100. confidence) suggests ************************** Wenn Sie denken, dass es nfsidmap standardmäßig erlaubt sein sollte, write Zugriff auf io.systemd.DynamicUser sock_file zu erhalten. Then sie sollten dies als Fehler melden. Um diesen Zugriff zu erlauben, können Sie ein lokales Richtlinien-Modul erstellen. Do zugriff jetzt erlauben, indem Sie die nachfolgenden Befehle ausführen: # ausearch -c 'nfsidmap' --raw | audit2allow -M my-nfsidmap # semodule -X 300 -i my-nfsidmap.pp Additional Information: Source Context system_u:system_r:nfsidmap_t:s0 Target Context system_u:object_r:systemd_userdbd_runtime_t:s0 Target Objects io.systemd.DynamicUser [ sock_file ] Source nfsidmap Source Path nfsidmap Port <Unbekannt> Host (removed) Source RPM Packages Target RPM Packages SELinux Policy RPM selinux-policy-targeted-38.15-1.fc38.noarch Local Policy RPM selinux-policy-targeted-38.15-1.fc38.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 6.3.7-200.fc38.x86_64 #1 SMP PREEMPT_DYNAMIC Fri Jun 9 15:21:11 UTC 2023 x86_64 Alert Count 5684 First Seen 2023-06-01 07:00:30 CEST Last Seen 2023-06-16 06:01:04 CEST Local ID 2cb26400-3819-4f89-92e2-2c0282742e29 Raw Audit Messages type=AVC msg=audit(1686888064.174:4130): avc: denied { write } for pid=657672 comm="nfsidmap" name="io.systemd.DynamicUser" dev="tmpfs" ino=33 scontext=system_u:system_r:nfsidmap_t:s0 tcontext=system_u:object_r:systemd_userdbd_runtime_t:s0 tclass=sock_file permissive=0 Hash: nfsidmap,nfsidmap_t,systemd_userdbd_runtime_t,sock_file,write Version-Release number of selected component: selinux-policy-targeted-38.15-1.fc38.noarch Additional info: reporter: libreport-2.17.10 package: selinux-policy-targeted-38.15-1.fc38.noarch hashmarkername: setroubleshoot type: libreport reason: SELinux is preventing nfsidmap from 'write' accesses on the sock_file io.systemd.DynamicUser. component: selinux-policy kernel: 6.3.7-200.fc38.x86_64 component: selinux-policy
Created attachment 1971079 [details] File: os_info
Created attachment 1971080 [details] File: description
FEDORA-2023-ba070ee6ba has been submitted as an update to Fedora 38. https://bodhi.fedoraproject.org/updates/FEDORA-2023-ba070ee6ba
FEDORA-2023-ba070ee6ba has been pushed to the Fedora 38 testing repository. Soon you'll be able to install the update with the following command: `sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2023-ba070ee6ba` You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2023-ba070ee6ba See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.
FEDORA-2023-ba070ee6ba has been pushed to the Fedora 38 stable repository. If problem still persists, please make note of it in this bug report.