Description of problem: SELinux is preventing runlevel from 'read' accesses on the arquivo utmp. ***** Plugin catchall (100. confidence) suggests ************************** Se você acredita nisso runlevel deve ser permitido read acesso no utmp file por padrão. Then você deve informar que este é um erro. Você pode gerar um módulo de política local para permitir este acesso. Do permitir este acesso por agora executando: # ausearch -c 'runlevel'--raw | audit2allow -M my-runlevel # semodule -X 300 -i my-runlevel.pp Additional Information: Source Context system_u:system_r:pcp_pmie_t:s0 Target Context system_u:object_r:initrc_var_run_t:s0 Target Objects utmp [ file ] Source runlevel Source Path runlevel Port <Desconhecido> Host (removed) Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.14.3-41.fc30.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 5.1.18-300.fc30.x86_64 #1 SMP Mon Jul 15 15:42:34 UTC 2019 x86_64 x86_64 Alert Count 18 First Seen 2019-07-21 11:25:02 -03 Last Seen 2019-07-21 18:45:06 -03 Local ID 9f320fd0-f377-4344-8c6b-4cf2bec1df43 Raw Audit Messages type=AVC msg=audit(1563745506.490:355): avc: denied { read } for pid=9379 comm="runlevel" name="utmp" dev="tmpfs" ino=18962 scontext=system_u:system_r:pcp_pmie_t:s0 tcontext=system_u:object_r:initrc_var_run_t:s0 tclass=file permissive=0 Hash: runlevel,pcp_pmie_t,initrc_var_run_t,file,read Version-Release number of selected component: selinux-policy-3.14.3-41.fc30.noarch Additional info: component: selinux-policy reporter: libreport-2.10.1 hashmarkername: setroubleshoot kernel: 5.1.18-300.fc30.x86_64 type: libreport Potential duplicate: bug 1470618
*** This bug has been marked as a duplicate of bug 1731760 ***