This is a variant of bug 2223571. This time it's about "create", instead of "sendto" or "write": audit: type=1400 audit(1693394653.739:4): avc: denied { create } for pid=993 comm="systemd-network" name=".#networkd734718013635965" scontext=system_u:system_r:systemd_network_generator_t:s0 tcontext=system_u:object_r:init_var_run_t:s0 tclass=file permissive=0 Reproducible: Sometimes Steps to Reproduce: We only saw this once, in a test case that's completely unrelated to network configuration. I. e. this is "magic background activity". But as it's very similar to #2223571, it's hopefully simple to adjust the policy?
This rather seems to be a follow-up to bz#2230226, but I believe it was resolved. What was your selinux-policy version?
Our image has selinux-policy-38.25-1.fc39.noarch . That's the latest available one from https://bodhi.fedoraproject.org/updates/?packages=selinux-policy. If the bz#2230226 fix didn't land in F39 yet, of course feel free to make this a duplicate. Thanks!
The fix was in selinux-policy-38.25-1.fc39.noarch, but not complex enough. Closing anyway as a dup now that the root cause is (hopefully) disclosed. *** This bug has been marked as a duplicate of bug 2230226 ***