Description of problem: SELinux is preventing systemd-tmpfile from 'map' accesses on the file /etc/ld.so.cache. ***** Plugin restorecon (94.8 confidence) suggests ************************ If si desidera sistemare l'etichetta. L'etichetta predefinita di /etc/ld.so.cache dovrebbe essere ld_so_cache_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /etc/ld.so.cache ***** Plugin catchall_labels (5.21 confidence) suggests ******************* If you want to allow systemd-tmpfile to have map access on the ld.so.cache file Then e' necessario modificare l'etichetta su /etc/ld.so.cache Do # semanage fcontext -a -t FILE_TYPE '/etc/ld.so.cache' dove FILE_TYPE è uno dei seguenti: file_context_t, fonts_t, ld_so_cache_t, ld_so_t, lib_t, locale_t, prelink_exec_t, systemd_tmpfiles_exec_t, textrel_shlib_t. Successivamente, eseguire: restorecon -v '/etc/ld.so.cache' ***** Plugin catchall (1.44 confidence) suggests ************************** If si crede che systemd-tmpfile dovrebbe avere possibilità di accesso map sui ld.so.cache file in modo predefinito. Then si dovrebbe riportare il problema come bug. E' possibile generare un modulo di politica locale per consentire questo accesso. Do allow this access for now by executing: # ausearch -c 'systemd-tmpfile' --raw | audit2allow -M my-systemdtmpfile # semodule -X 300 -i my-systemdtmpfile.pp Additional Information: Source Context system_u:system_r:systemd_tmpfiles_t:s0 Target Context system_u:object_r:etc_t:s0 Target Objects /etc/ld.so.cache [ file ] Source systemd-tmpfile Source Path systemd-tmpfile Port <Sconosciuto> Host (removed) Source RPM Packages Target RPM Packages glibc-2.26-1.fc27.1.x86_64 Policy RPM selinux-policy-3.13.1-270.fc27.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 4.13.0-0.rc4.git4.1.fc27.x86_64 #1 SMP Fri Aug 11 15:03:46 UTC 2017 x86_64 x86_64 Alert Count 1 First Seen 2017-08-14 08:21:16 CEST Last Seen 2017-08-14 08:21:16 CEST Local ID 1f7c730a-04f5-4eea-bb15-c286fb92ef9f Raw Audit Messages type=AVC msg=audit(1502691676.540:1005): avc: denied { map } for pid=2323 comm="systemd-tmpfile" path="/etc/ld.so.cache" dev="sda4" ino=787090 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Hash: systemd-tmpfile,systemd_tmpfiles_t,etc_t,file,map Version-Release number of selected component: selinux-policy-3.13.1-270.fc27.noarch Additional info: component: selinux-policy reporter: libreport-2.9.1 hashmarkername: setroubleshoot kernel: 4.13.0-0.rc4.git4.1.fc27.x86_64 type: libreport
This bug appears to have been reported against 'rawhide' during the Fedora 28 development cycle. Changing version to '28'.
I have the same problem since today (after an update) on Fedora 27: glibc-2.26-26.fc27.x86_64 glibc-2.26-26.fc27.i686 selinux-policy-3.13.1-283.26.fc27.noarch
*** This bug has been marked as a duplicate of bug 1543153 ***