Description of problem: SELinux is preventing /usr/bin/cp from 'relabelfrom' accesses on the directory internal. ***** Plugin catchall_labels (83.8 confidence) suggests ******************** If you want to allow cp to have relabelfrom access on the internal directory Then you need to change the label on internal Do # semanage fcontext -a -t FILE_TYPE 'internal' where FILE_TYPE is one of the following: initrc_tmp_t. Then execute: restorecon -v 'internal' ***** Plugin catchall (17.1 confidence) suggests *************************** If you believe that cp should be allowed relabelfrom access on the internal directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep cp /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context unconfined_u:system_r:initrc_t:s0 Target Context system_u:object_r:usr_t:s0 Target Objects internal [ dir ] Source cp Source Path /usr/bin/cp Port <Unknown> Host (removed) Source RPM Packages coreutils-8.17-8.fc18.x86_64 Target RPM Packages Policy RPM selinux-policy-3.11.1-97.fc18.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.9.6-200.fc18.x86_64 #1 SMP Thu Jun 13 18:56:55 UTC 2013 x86_64 x86_64 Alert Count 7 First Seen 2013-06-21 22:49:05 PDT Last Seen 2013-06-21 22:49:05 PDT Local ID db1cb6a8-6d78-4298-bf92-2d1555849ea6 Raw Audit Messages type=AVC msg=audit(1371880145.988:934): avc: denied { relabelfrom } for pid=6462 comm="cp" name="internal" dev="tmpfs" ino=52752 scontext=unconfined_u:system_r:initrc_t:s0 tcontext=system_u:object_r:usr_t:s0 tclass=dir type=SYSCALL msg=audit(1371880145.988:934): arch=x86_64 syscall=lsetxattr success=no exit=EACCES a0=1512fa0 a1=7fff38b6c9a0 a2=15133e0 a3=1b items=0 ppid=6458 pid=6462 auid=1000 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=2 tty=pts0 comm=cp exe=/usr/bin/cp subj=unconfined_u:system_r:initrc_t:s0 key=(null) Hash: cp,initrc_t,usr_t,dir,relabelfrom audit2allow #============= initrc_t ============== allow initrc_t usr_t:dir relabelfrom; audit2allow -R require { type usr_t; type initrc_t; class dir relabelfrom; } #============= initrc_t ============== allow initrc_t usr_t:dir relabelfrom; Additional info: reporter: libreport-2.1.5 hashmarkername: setroubleshoot kernel: 3.9.6-200.fc18.x86_64 type: libreport
*** This bug has been marked as a duplicate of bug 976939 ***