Description of problem: SELinux is preventing tlp from 'open' accesses on the file /usr/bin/systemctl. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tlp should be allowed open access on the systemctl file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tlp' --raw | audit2allow -M my-tlp # semodule -X 300 -i my-tlp.pp Additional Information: Source Context system_u:system_r:tlp_t:s0-s0:c0.c1023 Target Context system_u:object_r:systemd_systemctl_exec_t:s0 Target Objects /usr/bin/systemctl [ file ] Source tlp Source Path tlp Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages systemd-249.4-2.fc35.x86_64 SELinux Policy RPM selinux-policy-targeted-35.1-1.fc35.noarch Local Policy RPM selinux-policy-targeted-35.1-1.fc35.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 5.14.11-300.fc35.x86_64 #1 SMP Sun Oct 10 14:36:25 UTC 2021 x86_64 x86_64 Alert Count 12 First Seen 2021-10-12 23:16:19 CEST Last Seen 2021-10-12 23:16:19 CEST Local ID dba31334-294c-4735-83fe-30f20f7f2d72 Raw Audit Messages type=AVC msg=audit(1634073379.595:592): avc: denied { open } for pid=8000 comm="tlp" path="/usr/bin/systemctl" dev="nvme0n1p3" ino=3065887 scontext=system_u:system_r:tlp_t:s0-s0:c0.c1023 tcontext=system_u:object_r:systemd_systemctl_exec_t:s0 tclass=file permissive=0 Hash: tlp,tlp_t,systemd_systemctl_exec_t,file,open Version-Release number of selected component: selinux-policy-targeted-35.1-1.fc35.noarch Additional info: component: selinux-policy reporter: libreport-2.15.2 hashmarkername: setroubleshoot kernel: 5.14.11-300.fc35.x86_64 type: libreport
*** Bug 2020924 has been marked as a duplicate of this bug. ***
*** This bug has been marked as a duplicate of bug 2013439 ***