Description of problem: -> $ ausearch -ts 11:55 | egrep '(virt|qem|kvm)' | audit2why type=AVC msg=audit(1623236179.473:293): avc: denied { getattr } for pid=4052 comm="virtlogd" name="/" dev="proc" ino=1 scontext=system_u:system_r:virtlogd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_t:s0 tclass=filesystem permissive=0 Was caused by: Missing type enforcement (TE) allow rule. You can use audit2allow to generate a loadable module to allow this access. type=AVC msg=audit(1623236179.475:294): avc: denied { read append } for pid=4052 comm="virtlogd" name="system.token" dev="tmpfs" ino=44485 scontext=system_u:system_r:virtlogd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:virt_var_run_t:s0 tclass=file permissive=0 Was caused by: Missing type enforcement (TE) allow rule. You can use audit2allow to generate a loadable module to allow this access. type=AVC msg=audit(1623236298.688:548): avc: denied { getattr } for pid=6331 comm="virtlogd" name="/" dev="proc" ino=1 scontext=system_u:system_r:virtlogd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:proc_t:s0 tclass=filesystem permissive=0 Was caused by: Missing type enforcement (TE) allow rule. You can use audit2allow to generate a loadable module to allow this access. type=AVC msg=audit(1623236311.860:607): avc: denied { read append } for pid=6331 comm="virtlogd" name="system.token" dev="tmpfs" ino=44485 scontext=system_u:system_r:virtlogd_t:s0-s0:c0.c1023 tcontext=system_u:object_r:virt_var_run_t:s0 tclass=file permissive=0 Was caused by: Missing type enforcement (TE) allow rule. You can use audit2allow to generate a loadable module to allow this access. Maybe more(silent denials?) Version-Release number of selected component (if applicable): libvirt-daemon-7.4.0-1.el8s.x86_64 selinux-policy-targeted-3.14.3-68.el8.noarch selinux-policy-3.14.3-68.el8.noarch 4.18.0-305.3.1.el8.x86_64 How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info:
For current state of the system.token problem resolution, refer to https://bugzilla.redhat.com/show_bug.cgi?id=1964317
Thanks for the info. This really is critical as it does consequently affects/brakes oVirt. many thanks, L.
*** This bug has been marked as a duplicate of bug 1966842 ***