View Issue Details

IDProjectCategoryView StatusLast Update
0016280CentOS-7selinux-policypublic2019-07-18 20:07
Reportersethgoldin 
PrioritynormalSeverityminorReproducibilityhave not tried
Status newResolutionopen 
PlatformOSOS Version7
Product Version 
Target VersionFixed in Version 
Summary0016280: SELinux is preventing /usr/bin/cp from using the 'setfscreate' accesses on a process.
DescriptionDescription of problem:
SELinux is preventing /usr/bin/cp from using the 'setfscreate' accesses on a process.

***** Plugin catchall (100. confidence) suggests **************************

If you believe that cp should be allowed setfscreate access on processes labeled snappy_t by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'cp' --raw | audit2allow -M my-cp
# semodule -i my-cp.pp

Additional Information:
Source Context system_u:system_r:snappy_t:s0
Target Context system_u:system_r:snappy_t:s0
Target Objects Unknown [ process ]
Source cp
Source Path /usr/bin/cp
Port <Unknown>
Host (removed)
Source RPM Packages coreutils-8.22-23.el7.x86_64
Target RPM Packages
Policy RPM selinux-policy-3.13.1-229.el7_6.12.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name (removed)
Platform Linux (removed) 3.10.0-957.21.3.el7.x86_64 #1 SMP
                              Tue Jun 18 16:35:19 UTC 2019 x86_64 x86_64
Alert Count 2
First Seen 2019-06-04 15:23:13 EDT
Last Seen 2019-06-27 18:39:20 EDT
Local ID 2b5ad48a-9fa2-4e96-baf2-e827e9d5d955

Raw Audit Messages
type=AVC msg=audit(1561675160.454:9542): avc: denied { setfscreate } for pid=40453 comm="cp" scontext=system_u:system_r:snappy_t:s0 tcontext=system_u:system_r:snappy_t:s0 tclass=process permissive=1


type=SYSCALL msg=audit(1561675160.454:9542): arch=x86_64 syscall=write success=yes exit=ERANGE a0=3 a1=a2c9d0 a2=22 a3=7ffea93248e0 items=0 ppid=40006 pid=40453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=cp exe=/usr/bin/cp subj=system_u:system_r:snappy_t:s0 key=(null)

Hash: cp,snappy_t,snappy_t,process,setfscreate

Version-Release number of selected component:
selinux-policy-3.13.1-229.el7_6.12.noarch
Additional Informationreporter: libreport-2.1.11.1
hashmarkername: setroubleshoot
kernel: 3.10.0-957.21.3.el7.x86_64
reproducible: Not sure how to reproduce the problem
type: libreport
TagsNo tags attached.
abrt_hash49f880708eef76095539a427864ea035b96152bcbbd7e7ff6dd2e9570a8eef49
URL

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2019-07-18 20:07 sethgoldin New Issue