Description of problem: SELinux is preventing /usr/lib/systemd/systemd-journald from using the 'signull' accesses on a process. ***** Plugin catchall (100. confidence) suggests ************************** Si vous pensez que systemd-journald devrait être autorisé à accéder signull sur les processus étiquetés boltd_t par défaut. Then vous devriez rapporter ceci en tant qu'anomalie. Vous pouvez générer un module de stratégie local pour autoriser cet accès. Do autoriser cet accès pour le moment en exécutant : # ausearch -c "systemd-journal" --raw | audit2allow -M my-systemdjournal # semodule -X 300 -i my-systemdjournal.pp Additional Information: Source Context system_u:system_r:syslogd_t:s0 Target Context system_u:system_r:boltd_t:s0 Target Objects Inconnu [ process ] Source systemd-journal Source Path /usr/lib/systemd/systemd-journald Port <Inconnu> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.14.3-20.fc30.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 5.0.0-0.rc5.git0.1.fc30.x86_64 #1 SMP Mon Feb 4 15:03:14 UTC 2019 x86_64 x86_64 Alert Count 3 First Seen 2019-02-09 10:24:12 CET Last Seen 2019-02-09 10:25:44 CET Local ID 5176d1e8-8935-4b98-9592-1b45d90b0188 Raw Audit Messages type=AVC msg=audit(1549704344.119:398): avc: denied { signull } for pid=638 comm="systemd-journal" scontext=system_u:system_r:syslogd_t:s0 tcontext=system_u:system_r:boltd_t:s0 tclass=process permissive=1 Hash: systemd-journal,syslogd_t,boltd_t,process,signull Version-Release number of selected component: selinux-policy-3.14.3-20.fc30.noarch Additional info: component: selinux-policy reporter: libreport-2.10.0 hashmarkername: setroubleshoot kernel: 5.0.0-0.rc5.git0.1.fc30.x86_64 type: libreport
*** Bug 1674110 has been marked as a duplicate of this bug. ***
*** Bug 1674111 has been marked as a duplicate of this bug. ***
*** Bug 1674112 has been marked as a duplicate of this bug. ***
*** Bug 1674113 has been marked as a duplicate of this bug. ***
*** Bug 1674114 has been marked as a duplicate of this bug. ***
*** Bug 1674115 has been marked as a duplicate of this bug. ***
*** Bug 1674116 has been marked as a duplicate of this bug. ***
*** Bug 1674117 has been marked as a duplicate of this bug. ***
*** Bug 1674118 has been marked as a duplicate of this bug. ***
*** Bug 1674119 has been marked as a duplicate of this bug. ***
*** Bug 1674120 has been marked as a duplicate of this bug. ***
*** Bug 1674121 has been marked as a duplicate of this bug. ***
*** Bug 1674122 has been marked as a duplicate of this bug. ***
*** Bug 1674123 has been marked as a duplicate of this bug. ***
*** Bug 1674124 has been marked as a duplicate of this bug. ***
*** Bug 1674125 has been marked as a duplicate of this bug. ***
*** Bug 1674126 has been marked as a duplicate of this bug. ***
*** This bug has been marked as a duplicate of bug 1673847 ***