The problem is resolved with a local selinux module with these extra 
permissions granted to systemd_resolved_t:

allow systemd_resolved_t init_runtime_t:sock_file create;
allow systemd_resolved_t init_runtime_t:dir watch;

The confusion was caused by [1], or something else that caused the kernel to 
not print the avc: lines
on policy denial.  By luck, one of the boot-ups exposed this.  Earlier boots 
might have exposed the lines,
but the audit2* commands seem to only process avc: lines after the audit daemon 
is started, so I might
have missed the kernel log entry, because I was assuming that audit2why would 
have shown me something.

I'm not sure why delaying the service startup by a couple seconds/until after 
systemd-tmpfiles finishes
causes the service bring-up to succeed, so the correct fix is probably more 
than just adding those
two extra permissions, but it works in the meantime.

Best,
Antonio

[1] https://github.com/linux-audit/audit-kernel/issues/17

Attachment: OpenPGP_0x72DB026E04C1C768.asc
Description: OpenPGP public key

Attachment: OpenPGP_signature.asc
Description: OpenPGP digital signature

Reply via email to