Hello! As suggested, I retested this with Jessie: There are still some AVCs logged, but these differ from the ones logged in Wheezy.
Aug 5 09:26:11 debselinux01 kernel: [ 1.197831] audit: type=1400 audit(1407223571.360:4): avc: denied { net_admin } for pid=166 comm="systemd-tmpfile" capability=12 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:system_r:systemd_tmpfiles_t:s0 tclass=capability Aug 5 09:26:11 debselinux01 kernel: [ 1.199479] audit: type=1400 audit(1407223571.360:5): avc: denied { read } for pid=166 comm="systemd-tmpfile" name="urandom" dev="devtmpfs" ino=1033 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file Aug 5 09:26:11 debselinux01 kernel: [ 1.199488] audit: type=1400 audit(1407223571.360:6): avc: denied { read } for pid=166 comm="systemd-tmpfile" name="urandom" dev="devtmpfs" ino=1033 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file Aug 5 09:26:11 debselinux01 kernel: [ 1.199942] audit: type=1400 audit(1407223571.360:7): avc: denied { read } for pid=166 comm="systemd-tmpfile" name="urandom" dev="devtmpfs" ino=1033 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file Aug 5 09:26:11 debselinux01 kernel: [ 1.202553] audit: type=1400 audit(1407223571.364:8): avc: denied { getcap } for pid=166 comm="systemd-tmpfile" scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:system_r:systemd_tmpfiles_t:s0 tclass=process Aug 5 09:26:11 debselinux01 kernel: [ 1.202763] audit: type=1400 audit(1407223571.364:9): avc: denied { getattr } for pid=166 comm="systemd-tmpfile" path="/dev/autofs" dev="devtmpfs" ino=5287 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=chr_file Aug 5 09:26:11 debselinux01 kernel: [ 1.203130] audit: type=1400 audit(1407223571.364:10): avc: denied { getcap } for pid=166 comm="systemd-tmpfile" scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:system_r:systemd_tmpfiles_t:s0 tclass=process Kind regards Andre -- System Information: Debian Release: jessie/sid APT prefers testing-updates APT policy: (500, 'testing-updates'), (500, 'testing') Architecture: amd64 (x86_64) Kernel: Linux 3.14-1-amd64 (SMP w/4 CPU cores) Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Versions of packages selinux-policy-default depends on: ii libpam-modules 1.1.8-3 ii libselinux1 2.3-1 ii libsepol1 2.3-1 ii policycoreutils 2.3-1 ii python 2.7.8-1 ii selinux-utils 2.3-1 Versions of packages selinux-policy-default recommends: ii checkpolicy 2.3-1 ii setools 3.3.8-3 Versions of packages selinux-policy-default suggests: pn logcheck <none> pn syslog-summary <none> -- no debconf information -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org