Description of problem: This happens at boot, even after "fixfiles onboot", together with another 10 AVCs. SELinux is preventing ksmctl from 'create' accesses on the file run. ***** Plugin catchall (100. confidence) suggests ************************** Se ci credi ksmctl dovrebbe essere consentito create accesso al run file per impostazione predefinita. Then si dovrebbe riportare il problema come bug. E' possibile generare un modulo di politica locale per consentire questo accesso. Do consentire questo accesso per ora eseguendo: # ausearch -c 'ksmctl' --raw | audit2allow -M my-$MODULE_NOME # semodule -X 300 -i miei-ksmctl.pp Additional Information: Source Context system_u:system_r:ksm_t:s0 Target Context system_u:object_r:sysfs_t:s0 Target Objects run [ file ] Source ksmctl Source Path ksmctl Port <Sconosciuto> Host (removed) Source RPM Packages Target RPM Packages filesystem-3.16-2.fc36.x86_64 SELinux Policy RPM selinux-policy-targeted-36.9-1.fc36.noarch Local Policy RPM selinux-policy-targeted-36.9-1.fc36.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 5.17.11-300.fc36.x86_64 #1 SMP PREEMPT Wed May 25 15:04:05 UTC 2022 x86_64 x86_64 Alert Count 1 First Seen 2022-05-29 19:59:57 CEST Last Seen 2022-05-29 19:59:57 CEST Local ID ef562327-acab-4c70-94af-7e841eb8a30f Raw Audit Messages type=AVC msg=audit(1653847197.728:234): avc: denied { create } for pid=1174 comm="ksmctl" name="run" scontext=system_u:system_r:ksm_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=file permissive=1 Hash: ksmctl,ksm_t,sysfs_t,file,create Version-Release number of selected component: selinux-policy-targeted-36.9-1.fc36.noarch Additional info: component: selinux-policy reporter: libreport-2.17.1 hashmarkername: setroubleshoot kernel: 5.17.11-300.fc36.x86_64 type: libreport
*** This bug has been marked as a duplicate of bug 2091417 ***