Description of problem: SELinux is preventing systemd from 'map' accesses on the file /etc/selinux/targeted/policy/policy.33. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow domain to can mmap files Then you must tell SELinux about this by enabling the 'domain_can_mmap_files' boolean. Do setsebool -P domain_can_mmap_files 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that systemd should be allowed map access on the policy.33 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'systemd' --raw | audit2allow -M my-systemd # semodule -X 300 -i my-systemd.pp Additional Information: Source Context system_u:system_r:init_t:s0 Target Context unconfined_u:object_r:semanage_store_t:s0 Target Objects /etc/selinux/targeted/policy/policy.33 [ file ] Source systemd Source Path systemd Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages selinux-policy-targeted-38.11-1.fc39.noarch SELinux Policy RPM selinux-policy-targeted-38.11-1.fc39.noarch Local Policy RPM selinux-policy-targeted-38.11-1.fc39.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Host Name (removed) Platform Linux (removed) 6.3.0-63.fc39.x86_64+debug #1 SMP PREEMPT_DYNAMIC Mon Apr 24 16:53:17 UTC 2023 x86_64 Alert Count 3 First Seen 2023-04-25 03:49:52 +05 Last Seen 2023-04-25 04:03:20 +05 Local ID 3ea5ce2c-edd4-46d5-9f42-c3170c268c99 Raw Audit Messages type=AVC msg=audit(1682377400.423:343): avc: denied { map } for pid=1 comm="systemd" path="/etc/selinux/targeted/policy/policy.33" dev="nvme1n1p3" ino=162214 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:object_r:semanage_store_t:s0 tclass=file permissive=1 Hash: systemd,init_t,semanage_store_t,file,map Version-Release number of selected component: selinux-policy-targeted-38.11-1.fc39.noarch Additional info: reporter: libreport-2.17.9 reason: SELinux is preventing systemd from 'map' accesses on the file /etc/selinux/targeted/policy/policy.33. package: selinux-policy-targeted-38.11-1.fc39.noarch component: selinux-policy hashmarkername: setroubleshoot type: libreport kernel: 6.3.0-63.fc39.x86_64+debug component: selinux-policy
Created attachment 1959725 [details] File: description
Created attachment 1959726 [details] File: os_info
As discussed with Michal today, this is a result of a change in systemd: f36# ps w 1 PID TTY STAT TIME COMMAND 1 ? Ss 0:09 /usr/lib/systemd/systemd --switched-root --system --deserialize 31 f38# ps w 1 PID TTY STAT TIME COMMAND 1 ? Ss 0:27 /usr/lib/systemd/systemd --system --deserialize=45 which requires a code change not to use streq() for "deserialize" which has already been accepted upstream so should appear in rawhide soon and backported to F38. Denials from the duplicates: type=AVC msg=audit(1682369484.59:534): avc: denied { dyntransition } for pid=1 comm="systemd" scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=process permissive=1 type=AVC msg=audit(1682369484.59:533): avc: denied { setcurrent } for pid=1 comm="systemd" scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=process permissive=1 type=AVC msg=audit(1682377401.486:346): avc: denied { dyntransition } for pid=1 comm="systemd" scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=process permissive=1 type=AVC msg=audit(1682377401.486:345): avc: denied { setcurrent } for pid=1 comm="systemd" scontext=system_u:system_r:init_t:s0 tcontext=system_u:system_r:init_t:s0 tclass=process permissive=1
*** Bug 2189338 has been marked as a duplicate of this bug. ***
*** Bug 2189339 has been marked as a duplicate of this bug. ***
*** Bug 2189413 has been marked as a duplicate of this bug. ***
*** Bug 2189414 has been marked as a duplicate of this bug. ***
*** This bug has been marked as a duplicate of bug 2186821 ***