Red Hat Bugzilla – Bug 240870
SELinux doesn't like chrooted named
Last modified: 2013-04-30 19:35:53 EDT
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:126.96.36.199) Gecko/20070417 Fedora/188.8.131.52-4.fc7 Firefox/184.108.40.206
Description of problem:
SELinux is preventing /usr/sbin/named (named_t) "unlink" access to named.pid (named_zone_t).
SELinux denied access requested by /usr/sbin/named. It is not expected that this access is required by /usr/sbin/named and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Please file a bug report against this package.
Version-Release number of selected component (if applicable):
Steps to Reproduce:
You get the SELinux request to file a bug report.
SELinux should be very happy
I don't (yet) run SELinux enforcing so it's not an immediate problem for me.
restorecon -R /var/named/chroot/var/run/
seems to have fixed it.
Let's assume it's not a redhat problem.
I'd close it NOTABUG if I could.
Yeah, I'm writting comment that you could try restorecon on named.pid :) I'm
closing this one.