Description of problem: SELinux is preventing systemd from 'bind' accesses on the unix_stream_socket Unknown. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that systemd should be allowed bind access on the Unknown unix_stream_socket by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep systemd /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:init_t:s0 Target Context system_u:system_r:unconfined_service_t:s0 Target Objects Unknown [ unix_stream_socket ] Source systemd Source Path systemd Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.13.1-164.fc24.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 4.4.0-0.rc8.git0.1.fc24.x86_64 #1 SMP Mon Jan 4 17:13:26 UTC 2016 x86_64 x86_64 Alert Count 1 First Seen 2016-01-06 22:07:44 CET Last Seen 2016-01-06 22:07:44 CET Local ID c72dc684-ad9a-41c2-976a-96bdf7be46fb Raw Audit Messages type=AVC msg=audit(1452114464.735:79): avc: denied { bind } for pid=1 comm="systemd" scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=unix_stream_socket permissive=1 Hash: systemd,init_t,unconfined_service_t,unix_stream_socket,bind Version-Release number of selected component: selinux-policy-3.13.1-164.fc24.noarch Additional info: reporter: libreport-2.6.3 hashmarkername: setroubleshoot kernel: 4.4.0-0.rc8.git0.1.fc24.x86_64 type: libreport
*** This bug has been marked as a duplicate of bug 1296309 ***