DevHeads.net

SELinux is preventing 11-dhclient from add_name access on the directory chrony.servers.wlp8s0.

SELinux is preventing 11-dhclient from add_name access on the directory
chrony.servers.wlp8s0.

***** Plugin catchall (100. confidence) suggests
**************************

If you believe that 11-dhclient should be allowed add_name access on the
chrony.servers.wlp8s0 directory by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c '11-dhclient' --raw | audit2allow -M my-11dhclient
# semodule -X 300 -i my-11dhclient.pp

Additional Information:
Source Context system_u:system_r:NetworkManager_t:s0
Target Context system_u:object_r:dhcpc_state_t:s0
Target Objects chrony.servers.wlp8s0 [ dir ]
Source 11-dhclient
Source Path 11-dhclient
Port <Unknown>
Host castor
Source RPM Packages
Target RPM Packages
Policy RPM selinux-policy-3.14.4-40.fc31.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name castor
Platform Linux castor 5.3.12-300.fc31.x86_64 #1 SMP
Thu Nov
21 22:52:07 UTC 2019 x86_64 x86_64
Alert Count 2
First Seen 2019-11-30 18:03:35 CET
Last Seen 2019-12-01 11:16:46 CET
Local ID 0370e7fd-a826-4c80-8239-747a7528c5af

Raw Audit Messages
type=AVC msg=audit(1575195406.740:277): avc: denied { add_name } for
pid=1466 comm="11-dhclient" name="chrony.servers.wlp8s0"
scontext=system_u:system_r:NetworkManager_t:s0
tcontext=system_u:object_r:dhcpc_state_t:s0 tclass=dir permissive=0

Hash: 11-dhclient,NetworkManager_t,dhcpc_state_t,dir,add_name