On 04/23/2015 08:57 AM, Minear, Spencer wrote: > Running in permissive mode during development so the actual operation is not being blocked. An example of the audit is as follows > > [ 5.075061] audit: type=1400 audit(1429635963.920:3): avc: denied { create } for pid=2494 comm="sed" name="sedxhSZOp" scontext=system_u:system_r:sg_cfg_t:s0 tcontext=unconfined_u:object_r:etc_t:s0 tclass=file permissive=1 > > Running sesearch on the policy file, shows the following: > > Found 1 semantic av rules: > allow sg_cfg_t etc_t : file { ioctl read write create getattr setattr relabelfrom relabelto append unlink rename open } ; The user identities are not equal, so in a typical policy, this will violate a constraint on file create permission. audit2why tells which part of policy is denying the action, although the level of detail will vary depending on your policy version and how recent your selinux userspace is. _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.