Bug 2439964

Summary: SELinux is preventing /usr/bin/qemu-img from 'setattr' accesses on the file Fedora43Server_VARS.qcow2.
Product: [Fedora] Fedora Reporter: Mr. Beedell, Roke Julian Lockhart (RJLB) <8ru2u4gz>
Component: selinux-policyAssignee: Zdenek Pytela <zpytela>
Status: NEW --- QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 43CC: 8ru2u4gz, dan, lvrabec, mmalik, omosnacek, pkoncity, vmojzis, zpytela
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
Whiteboard: abrt_hash:59eee34d6bd28b868a116ed138ad64198d92fd6b8fdba3ed98c111944f37b6ff;VARIANT_ID=kde;
Fixed In Version: Doc Type: ---
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
File: description
none
File: os_info none

Description Mr. Beedell, Roke Julian Lockhart (RJLB) 2026-02-14 19:32:42 UTC
Description of problem:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

I did as https://discussion.fedoraproject.org/t/with-a-new-installation-of-fedora-server-43-it-is-unable-to-update-because-python3-botocore-1-42-45-1-fc43-is-404-at-the-sole-mirror-that-it-tries-to-access/181261 describes.
-----BEGIN PGP SIGNATURE-----

iHUEARYKAB0WIQTACnqipLcrwkiYEfPr9NsMQDxLLgUCaZDNnAAKCRDr9NsMQDxL
Lm4rAP9tDL2ATaDbZ6dIygg2XmFLM5I5avzHCFrDrctJCPfnPwEA/80xZrGmMvwY
i/8M5aGXy9bJC/lYBC0J0YPK0bY1YgY=
=2Lrh
-----END PGP SIGNATURE-----
SELinux is preventing /usr/bin/qemu-img from 'setattr' accesses on the file Fedora43Server_VARS.qcow2.

*****  Plugin catchall (100. confidence) suggests   **************************

If you believe that qemu-img should be allowed setattr access on the Fedora43Server_VARS.qcow2 file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'qemu-img' --raw | audit2allow -M my-qemuimg
# semodule -X 300 -i my-qemuimg.pp

Additional Information:
Source Context                system_u:system_r:virtstoraged_t:s0
Target Context                system_u:object_r:qemu_var_run_t:s0
Target Objects                Fedora43Server_VARS.qcow2 [ file ]
Source                        qemu-img
Source Path                   /usr/bin/qemu-img
Port                          <Unknown>
Host                          (removed)
Source RPM Packages           qemu-img-10.1.3-1.fc43.x86_64
Target RPM Packages           
SELinux Policy RPM            selinux-policy-targeted-42.23-1.fc43.noarch
Local Policy RPM              selinux-policy-targeted-42.23-1.fc43.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Permissive
Host Name                     (removed)
Platform                      Linux (removed) 6.18.9-200.fc43.x86_64 #1 SMP
                              PREEMPT_DYNAMIC Fri Feb 6 21:43:09 UTC 2026 x86_64
Alert Count                   1
First Seen                    2026-02-14 13:50:27 GMT
Last Seen                     2026-02-14 13:50:27 GMT
Local ID                      c36e14b4-c701-49b0-b0f4-c95620d18b46

Raw Audit Messages
type=AVC msg=audit(1771077027.563:289): avc:  denied  { setattr } for  pid=46434 comm="qemu-img" name="Fedora43Server_VARS.qcow2" dev="nvme2n1p4" ino=15371201 scontext=system_u:system_r:virtstoraged_t:s0 tcontext=system_u:object_r:qemu_var_run_t:s0 tclass=file permissive=1


type=SYSCALL msg=audit(1771077027.563:289): arch=x86_64 syscall=ioctl success=no exit=ENOTSUP a0=8 a1=401c5820 a2=7f965b939cf0 a3=0 items=0 ppid=44140 pid=46434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=qemu-img exe=/usr/bin/qemu-img subj=system_u:system_r:virtstoraged_t:s0 key=(null)

Hash: qemu-img,virtstoraged_t,qemu_var_run_t,file,setattr

Version-Release number of selected component:
selinux-policy-targeted-42.23-1.fc43.noarch

Additional info:
reporter:       libreport-2.17.15
reason:         SELinux is preventing /usr/bin/qemu-img from 'setattr' accesses on the file Fedora43Server_VARS.qcow2.
package:        selinux-policy-targeted-42.23-1.fc43.noarch
component:      selinux-policy
hashmarkername: setroubleshoot
type:           libreport
kernel:         6.18.9-200.fc43.x86_64
event_log:      2026-02-14-19:31:31> Looking for similar problems in bugzilla
component:      selinux-policy

Comment 1 Mr. Beedell, Roke Julian Lockhart (RJLB) 2026-02-14 19:32:45 UTC
Created attachment 2129490 [details]
File: description

Comment 2 Mr. Beedell, Roke Julian Lockhart (RJLB) 2026-02-14 19:32:47 UTC
Created attachment 2129491 [details]
File: os_info