


# ausearch -c 'qemu-system-x86' -raw | audit2allow -M my-qemusystemx86 You can generate a local policy module to allow this access. If you believe that qemu-system-x86 should be allowed execmem access on processes labeled svirt_t by default. Then you must tell SELinux about this by enabling the 'virt_use_execmem' boolean. Then you can allow the mapping by switching one of the following booleans: virt_use_execmemįollow the advice of the catchall_boolean plugin, otherwise contact your security administrator and report this issue If you know why qemu-system-x86 needs to map a memory region that is both executable and writable and understand that this is a potential security problem.

KES SELinux is preventing qemu-system-x86 from using the execmem access on a process. This issue does not happen when I start a domain that does not have 3D graphics enabled. I get this every time I start the KVM/Qemu/libvirt domain (VM) described below.
