Description of problem: I used cockpit-machines within cockpit. SELinux is preventing rpc-virtqemud from 'search' accesses on the directory 5703. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that rpc-virtqemud should be allowed search access on the 5703 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'rpc-virtqemud' --raw | audit2allow -M my-rpcvirtqemud # semodule -X 300 -i my-rpcvirtqemud.pp Additional Information: Source Context system_u:system_r:virtqemud_t:s0 Target Context system_u:system_r:unconfined_service_t:s0 Target Objects 5703 [ dir ] Source rpc-virtqemud Source Path rpc-virtqemud Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages SELinux Policy RPM selinux-policy-targeted-40.23-1.fc40.noarch Local Policy RPM selinux-policy-targeted-40.23-1.fc40.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 6.9.9-200.fc40.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Jul 11 19:29:01 UTC 2024 x86_64 Alert Count 1 First Seen 2024-07-13 15:42:33 AEST Last Seen 2024-07-13 15:42:33 AEST Local ID 8ab78db5-74f7-4f99-a30e-5f7ddd5df34f Raw Audit Messages type=AVC msg=audit(1720849353.838:332): avc: denied { search } for pid=5717 comm="rpc-virtqemud" name="5703" dev="proc" ino=52304 scontext=system_u:system_r:virtqemud_t:s0 tcontext=system_u:system_r:unconfined_service_t:s0 tclass=dir permissive=1 Hash: rpc-virtqemud,virtqemud_t,unconfined_service_t,dir,search Version-Release number of selected component: selinux-policy-targeted-40.23-1.fc40.noarch Additional info: reporter: libreport-2.17.15 reason: SELinux is preventing rpc-virtqemud from 'search' accesses on the directory 5703. package: selinux-policy-targeted-40.23-1.fc40.noarch component: selinux-policy hashmarkername: setroubleshoot type: libreport kernel: 6.9.9-200.fc40.x86_64 comment: I used cockpit-machines within cockpit. component: selinux-policy
Created attachment 2039508 [details] File: description
Created attachment 2039509 [details] File: os_info
Ian, Can you find out which service is it running as unconfined_service_t? ps -eo pid,fname,cmd,context | grep -e CONTEXT -e unconfined_service_t
I believe it is libvirt-dbus as in the other bugs. *** This bug has been marked as a duplicate of bug 2294366 ***
Looks correct: adama$ ps -eo pid,fname,cmd,context | grep -e CONTEXT -e unconfined_service_t PID COMMAND CMD CONTEXT 1796 switcher /usr/libexec/switcheroo-con system_u:system_r:unconfined_service_t:s0 2252 expressv /usr/sbin/expressvpnd --cli system_u:system_r:unconfined_service_t:s0 2319 dbus-dae /usr/bin/dbus-daemon --sysl system_u:system_r:unconfined_service_t:s0 281173 libvirt- /usr/sbin/libvirt-dbus --sy system_u:system_r:unconfined_service_t:s0 281570 Setroubl /usr/bin/python3 -Es /usr/s system_u:system_r:unconfined_service_t:s0 adama$