Description of problem: SELinux is preventing systemd-logind from getattr access on the file /dev/shm/lldpad.state. Version-Release number of selected component (if applicable): How reproducible: After reboot. Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Expect that a file being used by systemd-logind in /dev/shm is allowed access to it between reboots. Additional info: ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that systemd-logind should be allowed getattr access on the lldpad.state file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep systemd-logind /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:systemd_logind_t:s0 Target Context system_u:object_r:tmpfs_t:s0 Target Objects /dev/shm/lldpad.state [ file ] Source systemd-logind Source Path systemd-logind Port <Unknown> Host woot.home Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.13.1-155.fc23.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name woot.home Platform Linux woot.home 4.2.6-300.fc23.x86_64 #1 SMP Tue Nov 10 19:32:21 UTC 2015 x86_64 x86_64 Alert Count 12 First Seen 2015-11-26 21:15:02 EST Last Seen 2015-11-27 01:00:01 EST Local ID f54895ec-903a-4cdb-8e97-2f4aa7f66f81 Raw Audit Messages type=AVC msg=audit(1448604001.927:886): avc: denied { getattr } for pid=1059 comm="systemd-logind" path="/dev/shm/lldpad.state" dev="tmpfs" ino=14476 scontext=system_u:system_r:systemd_logind_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=file permissive=0 Hash: systemd-logind,systemd_logind_t,tmpfs_t,file,getattr
*** This bug has been marked as a duplicate of bug 1284293 ***