https://bugzilla.suse.com/show_bug.cgi?id=1217309 https://bugzilla.suse.com/show_bug.cgi?id=1217309#c1 Matthias Brugger <mbrugger@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Component|Transactional Update |Base Assignee|lubos.kocman@suse.com |screening-team-bugs@suse.de --- Comment #1 from Matthias Brugger <mbrugger@suse.com> --- I found this on the firstboot log:
setroubleshoot[1921]: SELinux is preventing /usr/sbin/rebootmgrd from read access on the file cpuinfo. For complete SELinux messages run: sealert -l 054a40c1-c97a-4717-a8b9-0e814935fcc7 systemd[1]: Starting Socket for Cockpit Web Service http instance... systemd[1]: Starting Socket for Cockpit Web Service https instance factory... systemd[1]: Listening on Socket for Cockpit Web Service http instance. systemd[1]: Listening on Socket for Cockpit Web Service https instance factory. systemd[1]: Starting Cockpit Web Service... kernel: BTRFS info (device mmcblk0p2): balance: start -musage=3 -susage=3 kernel: BTRFS info (device mmcblk0p2): relocating block group 2562654208 flags metadata|dup setroubleshoot[1921]: SELinux is preventing /usr/sbin/rebootmgrd from read access on the file cpuinfo.
***** Plugin catchall (100. confidence) suggests **************************
If you believe that rebootmgrd should be allowed read access on the cpuinfo file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'rebootmgrd' --raw | audit2allow -M my-rebootmgrd # semodule -X 300 -i my-rebootmgrd.pp
cockpit-certificate-ensure[2620]: /usr/lib/cockpit-certificate-helper: line 25: sscg: command not found -- You are receiving this mail because: You are on the CC list for the bug.