SELinux prevents constrained users from enabling or starting their podman.socket

Solution In Progress - Updated -

Issue

  • SELinux prevents users constrained to user_u and staff_u SELinux roles from enabling or starting their podman.socket

Environment

  • Red Hat Enterprise Linux 8.x
  • container-selinux

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content