Description of problem: SELinux is preventing systemd from 'map' accesses on the file /etc/selinux/targeted/policy/policy.33. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow any process to mmap any file on system with attribute file_type. Then you must tell SELinux about this by enabling the 'domain_can_mmap_files' boolean. You can read 'init_selinux' man page for more details. Do setsebool -P domain_can_mmap_files 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that systemd should be allowed map access on the policy.33 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'systemd' --raw | audit2allow -M my-systemd # semodule -X 300 -i my-systemd.pp Additional Information: Source Context system_u:system_r:init_t:s0 Target Context unconfined_u:object_r:semanage_store_t:s0 Target Objects /etc/selinux/targeted/policy/policy.33 [ file ] Source systemd Source Path systemd Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages selinux-policy-targeted-38.12-1.fc38.noarch SELinux Policy RPM selinux-policy-targeted-38.12-1.fc38.noarch Local Policy RPM selinux-policy-targeted-38.12-1.fc38.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 6.2.13-300.fc38.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Apr 27 01:33:30 UTC 2023 x86_64 Alert Count 1 First Seen 2023-04-30 13:34:57 CEST Last Seen 2023-04-30 13:34:57 CEST Local ID 1352a83b-1159-46e6-92b3-c825f7d3c02c Raw Audit Messages type=AVC msg=audit(1682854497.953:357): avc: denied { map } for pid=1 comm="systemd" path="/etc/selinux/targeted/policy/policy.33" dev="nvme0n1p5" ino=21876527 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:object_r:semanage_store_t:s0 tclass=file permissive=0 Hash: systemd,init_t,semanage_store_t,file,map Version-Release number of selected component: selinux-policy-targeted-38.12-1.fc38.noarch Additional info: reporter: libreport-2.17.9 reason: SELinux is preventing systemd from 'map' accesses on the file /etc/selinux/targeted/policy/policy.33. package: selinux-policy-targeted-38.12-1.fc38.noarch component: selinux-policy hashmarkername: setroubleshoot type: libreport kernel: 6.2.13-300.fc38.x86_64 component: selinux-policy
Created attachment 1961174 [details] File: description
Created attachment 1961175 [details] File: os_info
*** This bug has been marked as a duplicate of bug 2192059 ***