Description of problem: Just install the Nomachine 7.6.2, the message will appear. Don't need any step to replicate. SELinux is preventing systemd from 'ioctl' accesses on the file /usr/lib/systemd/system/nxserver.service. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that systemd should be allowed ioctl access on the nxserver.service file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'systemd' --raw | audit2allow -M my-systemd # semodule -X 300 -i my-systemd.pp Additional Information: Source Context system_u:system_r:init_t:s0 Target Context system_u:object_r:nx_unit_file_t:s0 Target Objects /usr/lib/systemd/system/nxserver.service [ file ] Source systemd Source Path systemd Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages SELinux Policy RPM selinux-policy-targeted-35.1-1.fc35.noarch Local Policy RPM selinux-policy-targeted-35.1-1.fc35.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 5.14.11-300.fc35.x86_64 #1 SMP Sun Oct 10 14:36:25 UTC 2021 x86_64 x86_64 Alert Count 54 First Seen 2021-10-16 14:24:28 +08 Last Seen 2021-10-16 14:24:29 +08 Local ID 450df685-40c9-4f37-b351-42f8f5a26e13 Raw Audit Messages type=AVC msg=audit(1634365469.499:373): avc: denied { ioctl } for pid=1 comm="systemd" path="/usr/lib/systemd/system/nxserver.service" dev="dm-0" ino=715 ioctlcmd=0x5401 scontext=system_u:system_r:init_t:s0 tcontext=system_u:object_r:nx_unit_file_t:s0 tclass=file permissive=0 Hash: systemd,init_t,nx_unit_file_t,file,ioctl Version-Release number of selected component: selinux-policy-targeted-35.1-1.fc35.noarch Additional info: component: selinux-policy reporter: libreport-2.15.2 hashmarkername: setroubleshoot kernel: 5.14.11-300.fc35.x86_64 type: libreport Potential duplicate: bug 1769673
*** This bug has been marked as a duplicate of bug 1769673 ***