Description of problem: SELinux is preventing /usr/lib/systemd/systemd-rfkill from using the 'fowner' capabilities. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that systemd-rfkill should have the fowner capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'systemd-rfkill' --raw | audit2allow -M my-systemdrfkill # semodule -X 300 -i my-systemdrfkill.pp Additional Information: Source Context system_u:system_r:systemd_rfkill_t:s0 Target Context system_u:system_r:systemd_rfkill_t:s0 Target Objects (null) [ capability ] Source systemd-rfkill Source Path /usr/lib/systemd/systemd-rfkill Port <Unknown> Host (removed) Source RPM Packages systemd-udev-248~rc4-2.fc35.x86_64 Target RPM Packages SELinux Policy RPM selinux-policy-targeted-3.14.8-6.fc35.noarch Local Policy RPM selinux-policy-targeted-3.14.8-6.fc35.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 5.12.0-0.rc3.20210319git8b12a62a4e 3e.172.fc35.x86_64 #1 SMP Sat Mar 20 04:06:54 +05 2021 x86_64 x86_64 Alert Count 1 First Seen 2021-03-22 20:14:33 +05 Last Seen 2021-03-22 20:14:33 +05 Local ID 1a2c91d0-877e-4627-995b-9bb4f9e9f223 Raw Audit Messages type=AVC msg=audit(1616426073.984:531): avc: denied { fowner } for pid=957 comm="systemd-rfkill" capability=3 scontext=system_u:system_r:systemd_rfkill_t:s0 tcontext=system_u:system_r:systemd_rfkill_t:s0 tclass=capability permissive=1 type=SYSCALL msg=audit(1616426073.984:531): arch=x86_64 syscall=fchmod success=yes exit=0 a0=5 a1=1a4 a2=0 a3=4 items=1 ppid=1 pid=957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=systemd-rfkill exe=/usr/lib/systemd/systemd-rfkill subj=system_u:system_r:systemd_rfkill_t:s0 key=(null) type=CWD msg=audit(1616426073.984:531): cwd=/ type=PATH msg=audit(1616426073.984:531): item=0 name=(null) inode=67667929 dev=103:02 mode=0100600 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:systemd_rfkill_var_lib_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Hash: systemd-rfkill,systemd_rfkill_t,systemd_rfkill_t,capability,fowner Version-Release number of selected component: selinux-policy-targeted-3.14.8-6.fc35.noarch Additional info: component: selinux-policy reporter: libreport-2.14.0 hashmarkername: setroubleshoot kernel: 5.12.0-0.rc3.20210319git8b12a62a4e3e.172.fc35.x86_64 type: libreport
There currently seems to be a problem with XFS and new kernels. Could you try if it reproduces with an older kernel from the 5.11 series?
*** This bug has been marked as a duplicate of bug 1933437 ***
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 500 days