NixOS / nix

Nix, the purely functional package manager
https://nixos.org/
GNU Lesser General Public License v2.1
12.77k stars 1.52k forks source link

Failed to link unit: Access denied #6332

Open philipacarlson opened 2 years ago

philipacarlson commented 2 years ago

Attempting to install nix package manager produced the following output, ending with an Access denied error.

System is Fedora 35. hostnamectl shows the following: ❯ hostnamectl <...snip...> Chassis: laptop <...snip...> Operating System: Fedora Linux 35 (Workstation Edition) CPE OS Name: cpe:/o:fedoraproject:fedora:35 Kernel: Linux 5.16.11-200.fc35.x86_64 Architecture: x86-64 Hardware Vendor: Dell Inc. Hardware Model: Latitude 5520

Here is the full output of the nix install: ❯ sh <(curl -L https://nixos.org/nix/install) --daemon % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 4046 100 4046 0 0 2679 0 0:00:01 0:00:01 --:--:-- 9051 downloading Nix 2.7.0 binary tarball for x86_64-linux from 'https://releases.nixos.org/nix/nix-2.7.0/nix-2.7.0-x86_64-linux.tar.xz' to '/tmp/nix-binary-tarball-unpack.8c1ZwhgtgS'... % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 27.4M 100 27.4M 0 0 6919k 0 0:00:04 0:00:04 --:--:-- 6919k Note: a multi-user installation is possible. See https://nixos.org/manual/nix/stable/installation/installing-binary.html#multi-user-installation Switching to the Multi-user Installer Welcome to the Multi-User Nix Installation

This installation tool will set up your computer with the Nix package manager. This will happen in a few stages:

  1. Make sure your computer doesn't already have Nix. If it does, I will show you instructions on how to clean up your old install.

  2. Show you what I am going to install and where. Then I will ask if you are ready to continue.

  3. Create the system users and groups that the Nix daemon uses to run builds.

  4. Perform the basic installation of the Nix files daemon.

  5. Configure your shell to import special Nix Profile files, so you can use Nix.

  6. Start the Nix daemon.

Would you like to see a more detailed list of what I will do? [y/n] n

---- let's talk about sudo ----------------------------------------------------- This script is going to call sudo a lot. Every time I do, it'll output exactly what it'll do, and why.

Just like this:

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo echo

to demonstrate how our sudo prompts look

This might look scary, but everything can be undone by running just a few commands. I used to ask you to confirm each time sudo ran, but it was too many times. Instead, I'll just ask you this one time:

Can I use sudo? [y/n] y

Yay! Thanks! Let's get going!

~~> Checking for artifacts of previous installs Before I try to install, I'll check for signs Nix already is or has been installed on this system.

---- Nix config report --------------------------------------------------------- Temp Dir: /tmp/tmp.55s9L5aFzV Nix Root: /nix Build Users: 32 Build Group ID: 30000 Build Group Name: nixbld

build users: Username: UID nixbld1: 30001 nixbld2: 30002 nixbld3: 30003 nixbld4: 30004 nixbld5: 30005 nixbld6: 30006 nixbld7: 30007 nixbld8: 30008 nixbld9: 30009 nixbld10: 30010 nixbld11: 30011 nixbld12: 30012 nixbld13: 30013 nixbld14: 30014 nixbld15: 30015 nixbld16: 30016 nixbld17: 30017 nixbld18: 30018 nixbld19: 30019 nixbld20: 30020 nixbld21: 30021 nixbld22: 30022 nixbld23: 30023 nixbld24: 30024 nixbld25: 30025 nixbld26: 30026 nixbld27: 30027 nixbld28: 30028 nixbld29: 30029 nixbld30: 30030 nixbld31: 30031 nixbld32: 30032

Ready to continue? [y/n] y

~~> Setting up the build group nixbld

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo groupadd -g 30000 --system nixbld

Create the Nix build group, nixbld

[sudo] password for phil: Created: Yes

~~> Setting up the build user nixbld1

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 1 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30001 --password ! nixbld1

Creating the Nix build user, nixbld1

useradd warning: nixbld1's uid 30001 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 1 nixbld1

in order to give nixbld1 a useful comment

usermod: no changes Note: Nix build user 1 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld2

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 2 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30002 --password ! nixbld2

Creating the Nix build user, nixbld2

useradd warning: nixbld2's uid 30002 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 2 nixbld2

in order to give nixbld2 a useful comment

usermod: no changes Note: Nix build user 2 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld3

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 3 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30003 --password ! nixbld3

Creating the Nix build user, nixbld3

useradd warning: nixbld3's uid 30003 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 3 nixbld3

in order to give nixbld3 a useful comment

usermod: no changes Note: Nix build user 3 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld4

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 4 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30004 --password ! nixbld4

Creating the Nix build user, nixbld4

useradd warning: nixbld4's uid 30004 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 4 nixbld4

in order to give nixbld4 a useful comment

usermod: no changes Note: Nix build user 4 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld5

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 5 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30005 --password ! nixbld5

Creating the Nix build user, nixbld5

useradd warning: nixbld5's uid 30005 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 5 nixbld5

in order to give nixbld5 a useful comment

usermod: no changes Note: Nix build user 5 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld6

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 6 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30006 --password ! nixbld6

Creating the Nix build user, nixbld6

useradd warning: nixbld6's uid 30006 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 6 nixbld6

in order to give nixbld6 a useful comment

usermod: no changes Note: Nix build user 6 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld7

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 7 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30007 --password ! nixbld7

Creating the Nix build user, nixbld7

useradd warning: nixbld7's uid 30007 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 7 nixbld7

in order to give nixbld7 a useful comment

usermod: no changes Note: Nix build user 7 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld8

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 8 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30008 --password ! nixbld8

Creating the Nix build user, nixbld8

useradd warning: nixbld8's uid 30008 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 8 nixbld8

in order to give nixbld8 a useful comment

usermod: no changes Note: Nix build user 8 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld9

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 9 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30009 --password ! nixbld9

Creating the Nix build user, nixbld9

useradd warning: nixbld9's uid 30009 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 9 nixbld9

in order to give nixbld9 a useful comment

usermod: no changes Note: Nix build user 9 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld10

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 10 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30010 --password ! nixbld10

Creating the Nix build user, nixbld10

useradd warning: nixbld10's uid 30010 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 10 nixbld10

in order to give nixbld10 a useful comment

usermod: no changes Note: Nix build user 10 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld11

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 11 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30011 --password ! nixbld11

Creating the Nix build user, nixbld11

useradd warning: nixbld11's uid 30011 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 11 nixbld11

in order to give nixbld11 a useful comment

usermod: no changes Note: Nix build user 11 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld12

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 12 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30012 --password ! nixbld12

Creating the Nix build user, nixbld12

useradd warning: nixbld12's uid 30012 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 12 nixbld12

in order to give nixbld12 a useful comment

usermod: no changes Note: Nix build user 12 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld13

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 13 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30013 --password ! nixbld13

Creating the Nix build user, nixbld13

useradd warning: nixbld13's uid 30013 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 13 nixbld13

in order to give nixbld13 a useful comment

usermod: no changes Note: Nix build user 13 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld14

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 14 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30014 --password ! nixbld14

Creating the Nix build user, nixbld14

useradd warning: nixbld14's uid 30014 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 14 nixbld14

in order to give nixbld14 a useful comment

usermod: no changes Note: Nix build user 14 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld15

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 15 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30015 --password ! nixbld15

Creating the Nix build user, nixbld15

useradd warning: nixbld15's uid 30015 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 15 nixbld15

in order to give nixbld15 a useful comment

usermod: no changes Note: Nix build user 15 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld16

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 16 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30016 --password ! nixbld16

Creating the Nix build user, nixbld16

useradd warning: nixbld16's uid 30016 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 16 nixbld16

in order to give nixbld16 a useful comment

usermod: no changes Note: Nix build user 16 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld17

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 17 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30017 --password ! nixbld17

Creating the Nix build user, nixbld17

useradd warning: nixbld17's uid 30017 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 17 nixbld17

in order to give nixbld17 a useful comment

usermod: no changes Note: Nix build user 17 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld18

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 18 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30018 --password ! nixbld18

Creating the Nix build user, nixbld18

useradd warning: nixbld18's uid 30018 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 18 nixbld18

in order to give nixbld18 a useful comment

usermod: no changes Note: Nix build user 18 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld19

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 19 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30019 --password ! nixbld19

Creating the Nix build user, nixbld19

useradd warning: nixbld19's uid 30019 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 19 nixbld19

in order to give nixbld19 a useful comment

usermod: no changes Note: Nix build user 19 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld20

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 20 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30020 --password ! nixbld20

Creating the Nix build user, nixbld20

useradd warning: nixbld20's uid 30020 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 20 nixbld20

in order to give nixbld20 a useful comment

usermod: no changes Note: Nix build user 20 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld21

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 21 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30021 --password ! nixbld21

Creating the Nix build user, nixbld21

useradd warning: nixbld21's uid 30021 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 21 nixbld21

in order to give nixbld21 a useful comment

usermod: no changes Note: Nix build user 21 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld22

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 22 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30022 --password ! nixbld22

Creating the Nix build user, nixbld22

useradd warning: nixbld22's uid 30022 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 22 nixbld22

in order to give nixbld22 a useful comment

usermod: no changes Note: Nix build user 22 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld23

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 23 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30023 --password ! nixbld23

Creating the Nix build user, nixbld23

useradd warning: nixbld23's uid 30023 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 23 nixbld23

in order to give nixbld23 a useful comment

usermod: no changes Note: Nix build user 23 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld24

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 24 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30024 --password ! nixbld24

Creating the Nix build user, nixbld24

useradd warning: nixbld24's uid 30024 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 24 nixbld24

in order to give nixbld24 a useful comment

usermod: no changes Note: Nix build user 24 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld25

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 25 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30025 --password ! nixbld25

Creating the Nix build user, nixbld25

useradd warning: nixbld25's uid 30025 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 25 nixbld25

in order to give nixbld25 a useful comment

usermod: no changes Note: Nix build user 25 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld26

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 26 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30026 --password ! nixbld26

Creating the Nix build user, nixbld26

useradd warning: nixbld26's uid 30026 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 26 nixbld26

in order to give nixbld26 a useful comment

usermod: no changes Note: Nix build user 26 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld27

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 27 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30027 --password ! nixbld27

Creating the Nix build user, nixbld27

useradd warning: nixbld27's uid 30027 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 27 nixbld27

in order to give nixbld27 a useful comment

usermod: no changes Note: Nix build user 27 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld28

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 28 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30028 --password ! nixbld28

Creating the Nix build user, nixbld28

useradd warning: nixbld28's uid 30028 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 28 nixbld28

in order to give nixbld28 a useful comment

usermod: no changes Note: Nix build user 28 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld29

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 29 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30029 --password ! nixbld29

Creating the Nix build user, nixbld29

useradd warning: nixbld29's uid 30029 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 29 nixbld29

in order to give nixbld29 a useful comment

usermod: no changes Note: Nix build user 29 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld30

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 30 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30030 --password ! nixbld30

Creating the Nix build user, nixbld30

useradd warning: nixbld30's uid 30030 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 30 nixbld30

in order to give nixbld30 a useful comment

usermod: no changes Note: Nix build user 30 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld31

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 31 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30031 --password ! nixbld31

Creating the Nix build user, nixbld31

useradd warning: nixbld31's uid 30031 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 31 nixbld31

in order to give nixbld31 a useful comment

usermod: no changes Note: Nix build user 31 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the build user nixbld32

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo useradd --home-dir /var/empty --comment Nix build user 32 --gid 30000 --groups nixbld --no-user-group --system --shell /sbin/nologin --uid 30032 --password ! nixbld32

Creating the Nix build user, nixbld32

useradd warning: nixbld32's uid 30032 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo usermod --comment Nix build user 32 nixbld32

in order to give nixbld32 a useful comment

usermod: no changes Note: Nix build user 32 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000

~~> Setting up the basic directory structure

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo install -dv -m 0755 /nix /nix/var /nix/var/log /nix/var/log/nix /nix/var/log/nix/drvs /nix/var/nix /nix/var/nix/db /nix/var/nix/gcroots /nix/var/nix/profiles /nix/var/nix/temproots /nix/var/nix/userpool /nix/var/nix/daemon-socket /nix/var/nix/gcroots/per-user /nix/var/nix/profiles/per-user

to make the basic directory structure of Nix (part 1)

install: creating directory '/nix' install: creating directory '/nix/var' install: creating directory '/nix/var/log' install: creating directory '/nix/var/log/nix' install: creating directory '/nix/var/log/nix/drvs' install: creating directory '/nix/var/nix' install: creating directory '/nix/var/nix/db' install: creating directory '/nix/var/nix/gcroots' install: creating directory '/nix/var/nix/profiles' install: creating directory '/nix/var/nix/temproots' install: creating directory '/nix/var/nix/userpool' install: creating directory '/nix/var/nix/daemon-socket' install: creating directory '/nix/var/nix/gcroots/per-user' install: creating directory '/nix/var/nix/profiles/per-user'

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo install -dv -g nixbld -m 1775 /nix/store

to make the basic directory structure of Nix (part 2)

install: creating directory '/nix/store'

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo install -dv -m 0555 /etc/nix

to place the default nix daemon configuration (part 1)

install: creating directory '/etc/nix'

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo install -m 0664 /tmp/tmp.55s9L5aFzV/.nix-channels /root/.nix-channels

to set up the default system channel (part 1)

~~> Installing Nix

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo cp -RLp ./store/0n2wfvi1i3fg97cjc54wslvk0804y0sn-nix-2.7.0 ./store/10jzrky6qp59qm75zwxxjysyzphywznj-openssl-1.1.1l-bin ./store/1c1r48qa0m23vr9jy8sm0dc04vv14dak-coreutils-8.32 ./store/1kw32h97j6bbqcb2kl2nnaw57xnwyvcb-zstd-1.4.9 ./store/21iicqw6ib82qa1f1gfgppijz7sck8xj-aws-c-io-0.9.1 ./store/23wq9xncqncvxyddqpcb57f1qkgywdrr-aws-c-event-stream-0.2.7 ./store/433q5vd1ag3lg6chrm7pkqc78536l7pr-sqlite-3.35.5 ./store/4frnjf7jr2cc5k5wfqjapvszanmc8nq9-openssl-1.1.1l ./store/50msfhkz5wbyk8i78pjv3y9lxdrp7dlm-gcc-10.3.0-lib ./store/5d821pjgzb90lw4zbg6xwxs7llm335wr-libunistring-0.9.10 ./store/5p4jga61v4mg9pdrglj2hj76y5rbz02k-busybox-static-x86_64-unknown-linux-musl-1.32.1 ./store/5q2fwg0hhaw6n9j50snd6bn7r5rqr8y9-attr-2.4.48 ./store/5r0a92rsppim1dljzr0rhpxwdsmnab9l-libssh2-1.9.0 ./store/7lv2ahpd0x6zknyalr55mar2il2a3v0k-libsodium-1.0.18 ./store/7v7acyh2s8z2sajc1sijjs7a0svlwbyx-brotli-1.0.9-lib ./store/9pxjmchn68d0l78pcq3r54xdgaxpl83j-s2n-tls-1.0.0 ./store/ckb0qa2yrxrpp0piffgjq9id38gc5z9v-libidn2-2.3.1 ./store/dp18s34dnzbllx16cyb2pwz0fm19nbnf-bzip2-1.0.6.0.2 ./store/ds491f6b5pdk3xxnc2w103asyz1y4cfc-zlib-1.2.11 ./store/dvcalma5h3wd8bbwhj7g9m3yswxm707c-nss-cacert-3.66 ./store/fvb3znd0x7ijk0bqg3m1rndbzpspamrg-keyutils-1.6.3-lib ./store/hh5ai1v2hhizkv5n4fr4hg72l1a5z1iw-curl-7.76.1 ./store/hi3dzzq1i54cpv259srcr99vh6lc4a65-openssl-1.1.1l-dev ./store/isba0ijzzp6m65sd136y66kklcbw24ra-nlohmann_json-3.9.1 ./store/iz2jmn57crmp45y19bsj73bckj331jkq-xz-5.2.5 ./store/jbrdvdbanx81n7h4ij53mnb6v5qrc4h7-aws-checksums-0.1.11 ./store/jsfa5dnrrp1cl7yxkq8smgygg9fysgvk-aws-sdk-cpp-1.8.121 ./store/jsp3h3wpzc842j0rz61m5ly71ak6qgdn-glibc-2.32-54 ./store/l3hn1rpl7m5x45x1733x4n6wgdmn9pz0-editline-1.17.1 ./store/l4vm4han6vnnijhb6icmybbskq73ymj0-libxml2-2.9.12 ./store/lbc8s09msihzfrdfbsb7m3660hs05igp-libkrb5-1.18 ./store/mrv4y369nw6hg4pw8d9p9bfdxj9pjw0x-acl-2.3.0 ./store/n5vm0iv9jsxl0jbh8wh9l0sy8lb55z01-libarchive-3.5.2-lib ./store/n9va4cqy8r026jcjkxbnzhqbd33kl3nm-nghttp2-1.43.0-lib ./store/qbaw001d1y04khwlmd6w1pgk6ggd3fic-boehm-gc-8.0.4 ./store/rsf0p5xifn2n5smg5v3l1sz75sv0maz2-libcpuid-0.5.1 ./store/vaal5xhgdn20qgjj58p9kdnqam8ppn6y-perl-5.32.1 ./store/w2wh0vxwk48fcdli04a38b4inbrj2qpz-aws-c-cal-0.4.5 ./store/wdja1fn6ldqzfy7ra9f072q34249dnd5-libseccomp-2.5.1-lib ./store/wv35g5lff84rray15zlzarcqi9fxzz84-bash-4.4-p23 ./store/yicaw4ql8dz3bvrpw1swxn3xwvr0afk3-aws-c-common-0.5.5 /nix/store/

to copy the basic Nix files to the new store at /nix/store

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo chmod -R ugo-w /nix/store/

to make the new store non-writable at /nix/store

  Alright! We have our first nix at /nix/store/0n2wfvi1i3fg97cjc54wslvk0804y0sn-nix-2.7.0

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo /nix/store/0n2wfvi1i3fg97cjc54wslvk0804y0sn-nix-2.7.0/bin/nix-store --load-db

to load data for the first time in to the Nix Database

  Just finished getting the nix database ready.

~~> Setting up shell profiles: /etc/bashrc /etc/profile.d/nix.sh /etc/zshrc /etc/bash.bashrc /etc/zsh/zshrc

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo cp /etc/bashrc /etc/bashrc.backup-before-nix

to back up your current /etc/bashrc to /etc/bashrc.backup-before-nix

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo tee -a /etc/bashrc

extend your /etc/bashrc with nix-daemon settings

Nix

if [ -e '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' ]; then . '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' fi

End Nix

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo touch /etc/profile.d/nix.sh

to create a stub /etc/profile.d/nix.sh which will be updated

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo tee -a /etc/profile.d/nix.sh

extend your /etc/profile.d/nix.sh with nix-daemon settings

Nix

if [ -e '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' ]; then . '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' fi

End Nix

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo touch /etc/zshrc

to create a stub /etc/zshrc which will be updated

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo tee -a /etc/zshrc

extend your /etc/zshrc with nix-daemon settings

Nix

if [ -e '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' ]; then . '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' fi

End Nix

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo touch /etc/bash.bashrc

to create a stub /etc/bash.bashrc which will be updated

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo tee -a /etc/bash.bashrc

extend your /etc/bash.bashrc with nix-daemon settings

Nix

if [ -e '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' ]; then . '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' fi

End Nix

~~> Setting up the default profile

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo HOME=/root /nix/store/0n2wfvi1i3fg97cjc54wslvk0804y0sn-nix-2.7.0/bin/nix-env -i /nix/store/0n2wfvi1i3fg97cjc54wslvk0804y0sn-nix-2.7.0

to install a bootstrapping Nix in to the default profile

installing 'nix-2.7.0' building '/nix/store/gfivzi28pmihjakm38wj42n1693w1pj0-user-environment.drv'...

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo HOME=/root /nix/store/0n2wfvi1i3fg97cjc54wslvk0804y0sn-nix-2.7.0/bin/nix-env -i /nix/store/dvcalma5h3wd8bbwhj7g9m3yswxm707c-nss-cacert-3.66

to install a bootstrapping SSL certificate just for Nix in to the default profile

installing 'nss-cacert-3.66' building '/nix/store/6a54k4ji47g1hsl1lch4dk31ywfz77hk-user-environment.drv'...

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo HOME=/root NIX_SSL_CERT_FILE=/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt /nix/store/0n2wfvi1i3fg97cjc54wslvk0804y0sn-nix-2.7.0/bin/nix-channel --update nixpkgs

to update the default channel in the default profile

unpacking channels...

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo install -m 0664 /tmp/tmp.55s9L5aFzV/nix.conf /etc/nix/nix.conf

to place the default nix daemon configuration (part 2)

~~> Setting up the nix-daemon systemd service

---- sudo execution ------------------------------------------------------------ I am executing:

$ sudo systemctl link /nix/var/nix/profiles/default/lib/systemd/system/nix-daemon.service

to set up the nix-daemon service

Failed to link unit: Access denied

---- oh no! -------------------------------------------------------------------- Jeeze, something went wrong. If you can take all the output and open an issue, we'd love to fix the problem so nobody else has this issue.

:(

We'd love to help if you need it.

You can open an issue at https://github.com/nixos/nix/issues

Or feel free to contact the team:

joeryan commented 2 years ago

I experienced the same error on Fedora 35. Full output available on request hostnamectl output:
Transient hostname: fedora Icon name: computer-convertible Chassis: convertible

.... Operating System: Fedora Linux 35 (Workstation Edition) CPE OS Name: cpe:/o:fedoraproject:fedora:35 Kernel: Linux 5.16.13-200.fc35.x86_64 Architecture: x86-64 Hardware Vendor: HP Hardware Model: HP Pavilion x360 m3 Convertible
TLATER commented 2 years ago

Might help get more readers if you put your error message in code blocks - besides making the formatting nicer, and distinguishing the prose from the script output, GitHub will then automatically add scrollbars so your post doesn't look like a novel ;)

jtagcat commented 2 years ago
SELinux is preventing systemd from read access on the lnk_file default.

*****  Plugin catchall_labels (83.8 confidence) suggests   *******************

If you want to allow systemd to have read access on the default lnk_file
Then you need to change the label on default
Do
# semanage fcontext -a -t FILE_TYPE 'default'
where FILE_TYPE is one of the following: NetworkManager_etc_rw_t, NetworkManager_etc_t, NetworkManager_unit_file_t, NetworkManager_var_run_t, abrt_etc_t, abrt_unit_file_t, abrt_var_run_t, accountsd_unit_file_t, admin_home_t, aiccu_etc_t, aiccu_var_run_t, ajaxterm_var_run_t, alsa_etc_rw_t, alsa_lock_t, alsa_unit_file_t, alsa_var_run_t, amanda_unit_file_t, antivirus_conf_t, antivirus_unit_file_t, antivirus_var_run_t, apcupsd_lock_t, apcupsd_unit_file_t, apcupsd_var_run_t, apmd_lock_t, apmd_unit_file_t, apmd_var_run_t, arpwatch_unit_file_t, arpwatch_var_run_t, asterisk_etc_t, asterisk_var_run_t, audisp_var_run_t, auditd_unit_file_t, auditd_var_run_t, automount_lock_t, automount_unit_file_t, automount_var_run_t, avahi_conf_t, avahi_unit_file_t, avahi_var_run_t, bacula_var_run_t, bcfg2_unit_file_t, bcfg2_var_run_t, bin_t, bitlbee_conf_t, bitlbee_var_run_t, blkmapd_var_run_t, blktap_var_run_t, blueman_var_run_t, bluetooth_conf_t, bluetooth_lock_t, bluetooth_unit_file_t, bluetooth_var_run_t, boinc_unit_file_t, boltd_var_lib_t, boltd_var_run_t, boot_t, bootloader_etc_t, bootloader_var_run_t, brltty_unit_file_t, brltty_var_run_t, bumblebee_unit_file_t, bumblebee_var_run_t, cache_home_t, cachefilesd_var_run_t, callweaver_var_run_t, canna_var_run_t, cardmgr_var_run_t, ccs_var_run_t, cert_t, certmaster_var_run_t, certmonger_unit_file_t, certmonger_var_run_t, cgconfig_etc_t, cgred_var_run_t, cgroup_t, cgrules_etc_t, chronyd_unit_file_t, chronyd_var_run_t, cinder_api_unit_file_t, cinder_backup_unit_file_t, cinder_scheduler_unit_file_t, cinder_var_run_t, cinder_volume_unit_file_t, clogd_var_run_t, cloud_init_unit_file_t, cluster_conf_t, cluster_unit_file_t, cluster_var_run_t, clvmd_var_run_t, cmirrord_var_run_t, cobbler_etc_t, cockpit_unit_file_t, cockpit_var_run_t, collectd_unit_file_t, collectd_var_run_t, colord_unit_file_t, comsat_var_run_t, condor_conf_t, condor_unit_file_t, condor_var_lock_t, condor_var_run_t, config_home_t, conman_unit_file_t, conman_var_run_t, conntrackd_conf_t, conntrackd_unit_file_t, conntrackd_var_lock_t, conntrackd_var_run_t, consolekit_unit_file_t, consolekit_var_run_t, container_config_t, container_file_t, container_kvm_var_run_t, container_lock_t, container_plugin_var_run_t, container_ro_file_t, container_runtime_tmpfs_t, container_unit_file_t, container_var_lib_t, container_var_run_t, couchdb_conf_t, couchdb_unit_file_t, couchdb_var_run_t, courier_etc_t, courier_var_run_t, cpucontrol_conf_t, cpuplug_lock_t, cpuplug_var_run_t, cpuspeed_var_run_t, cron_var_run_t, crond_unit_file_t, crond_var_run_t, ctdbd_var_run_t, cupsd_config_var_run_t, cupsd_etc_t, cupsd_lock_t, cupsd_lpd_var_run_t, cupsd_rw_etc_t, cupsd_unit_file_t, cupsd_var_run_t, cvs_var_run_t, cyphesis_var_run_t, cyrus_var_run_t, data_home_t, dbskkd_var_run_t, dbus_home_t, dbusd_etc_t, dbusd_unit_file_t, dcc_var_run_t, dccd_var_run_t, dccifd_var_run_t, dccm_var_run_t, dcerpcd_var_run_t, ddclient_etc_t, ddclient_var_run_t, deltacloudd_var_run_t, denyhosts_var_lock_t, device_t, devicekit_var_run_t, devlog_t, dhcp_etc_t, dhcpc_var_run_t, dhcpd_unit_file_t, dhcpd_var_run_t, dictd_etc_t, dictd_var_run_t, dirsrv_snmp_var_run_t, dirsrv_unit_file_t, dirsrv_var_lock_t, dirsrv_var_run_t, dirsrvadmin_lock_t, dirsrvadmin_unit_file_t, dkim_milter_data_t, dlm_controld_var_run_t, dnsmasq_etc_t, dnsmasq_unit_file_t, dnsmasq_var_run_t, dnssec_trigger_unit_file_t, dnssec_trigger_var_run_t, dovecot_etc_t, dovecot_var_run_t, drbd_lock_t, drbd_var_run_t, dspam_var_run_t, entropyd_var_run_t, etc_aliases_t, etc_mail_t, etc_runtime_t, etc_t, eventlogd_var_run_t, evtchnd_var_run_t, exim_var_run_t, exports_t, fail2ban_var_run_t, fcoemon_var_run_t, fenced_lock_t, fenced_var_run_t, fetchmail_etc_t, fetchmail_var_run_t, file_context_t, fingerd_etc_t, fingerd_var_run_t, firewalld_etc_rw_t, firewalld_unit_file_t, firewalld_var_run_t, firstboot_etc_t, foghorn_var_run_t, fonts_cache_t, fonts_t, freeipmi_bmc_watchdog_unit_file_t, freeipmi_bmc_watchdog_var_run_t, freeipmi_ipmidetectd_unit_file_t, freeipmi_ipmidetectd_var_run_t, freeipmi_ipmiseld_unit_file_t, freeipmi_ipmiseld_var_run_t, fsadm_var_run_t, fsdaemon_var_run_t, ftpd_etc_t, ftpd_lock_t, ftpd_unit_file_t, ftpd_var_run_t, fwupd_unit_file_t, games_srv_var_run_t, gconf_etc_t, gconf_home_t, gdomap_conf_t, gdomap_var_run_t, getty_etc_t, getty_lock_t, getty_unit_file_t, getty_var_run_t, gfs_controld_var_run_t, gkeyringd_gnome_home_t, glance_api_unit_file_t, glance_registry_unit_file_t, glance_scrubber_unit_file_t, glance_var_run_t, glusterd_var_run_t, gnome_home_t, gpm_conf_t, gpm_var_run_t, gpsd_var_run_t, greylist_milter_data_t, groupd_var_run_t, gssproxy_unit_file_t, gssproxy_var_run_t, gstreamer_home_t, haproxy_unit_file_t, haproxy_var_run_t, hddtemp_etc_t, home_root_t, hostapd_unit_file_t, hostapd_var_run_t, hostname_etc_t, hsqldb_unit_file_t, httpd_config_t, httpd_lock_t, httpd_unit_file_t, httpd_var_run_t, hwloc_dhwd_unit_t, hwloc_var_run_t, hypervkvp_unit_file_t, hypervvssd_unit_file_t, ibacm_conf_t, ibacm_var_run_t, icc_data_home_t, icecast_var_run_t, ifconfig_var_run_t, inetd_child_var_run_t, inetd_var_run_t, init_tmp_t, init_var_lib_t, init_var_run_t, initrc_var_run_t, innd_etc_t, innd_unit_file_t, innd_var_run_t, iodined_unit_file_t, ipa_dnskey_unit_file_t, ipa_ods_exporter_unit_file_t, ipa_otpd_unit_file_t, ipa_var_run_t, ipmievd_lock_t, ipmievd_unit_file_t, ipmievd_var_run_t, ipsec_mgmt_lock_t, ipsec_mgmt_unit_file_t, ipsec_mgmt_var_run_t, ipsec_var_run_t, iptables_lock_t, iptables_unit_file_t, iptables_var_lib_t, iptables_var_run_t, irc_conf_t, irqbalance_var_run_t, irssi_etc_t, iscsi_lock_t, iscsi_unit_file_t, iscsi_var_run_t, isnsd_var_run_t, iwhd_var_run_t, jetty_unit_file_t, jetty_var_run_t, kadmind_var_run_t, kdump_etc_t, kdump_lock_t, kdump_unit_file_t, keepalived_unit_file_t, keepalived_var_run_t, keystone_unit_file_t, keystone_var_run_t, kismet_var_run_t, klogd_var_run_t, kmod_var_run_t, kmscon_conf_t, kmscon_unit_file_t, krb5_conf_t, krb5kdc_conf_t, krb5kdc_lock_t, krb5kdc_var_run_t, ksmtuned_unit_file_t, ksmtuned_var_run_t, ktalkd_unit_file_t, kubernetes_file_t, l2tp_conf_t, l2tpd_var_run_t, ld_so_t, lib_t, likewise_etc_t, likewise_pstore_lock_t, lircd_etc_t, lircd_var_run_t, lldpad_var_run_t, local_login_lock_t, locale_t, locate_var_run_t, lockdev_lock_t, logrotate_lock_t, logwatch_lock_t, logwatch_var_run_t, lpd_var_run_t, lsassd_var_run_t, lsmd_unit_file_t, lsmd_var_run_t, lttng_sessiond_unit_file_t, lttng_sessiond_var_run_t, lvm_etc_t, lvm_lock_t, lvm_unit_file_t, lvm_var_run_t, lwiod_var_run_t, lwregd_var_run_t, lwsmd_var_run_t, machineid_t, mailman_lock_t, mailman_var_run_t, man_cache_t, man_t, mandb_lock_t, mcelog_etc_t, mcelog_var_run_t, mdadm_conf_t, mdadm_unit_file_t, mdadm_var_run_t, memcached_var_run_t, minidlna_conf_t, minidlna_var_run_t, minissdpd_conf_t, minissdpd_var_run_t, mip6d_unit_file_t, mirrormanager_var_run_t, mnt_t, mock_etc_t, mock_var_run_t, modemmanager_unit_file_t, modules_conf_t, modules_object_t, mon_statd_var_run_t, mongod_unit_file_t, mongod_var_run_t, motion_unit_file_t, motion_var_run_t, mount_var_run_t, mozilla_conf_t, mpd_etc_t, mpd_var_run_t, mplayer_etc_t, mrtg_etc_t, mrtg_lock_t, mrtg_var_run_t, mscan_etc_t, mscan_var_run_t, munin_etc_t, munin_var_run_t, mysqld_etc_t, mysqld_unit_file_t, mysqld_var_run_t, mysqlmanagerd_var_run_t, naemon_var_run_t, nagios_etc_t, nagios_var_run_t, named_conf_t, named_unit_file_t, named_var_run_t, net_conf_t, netlabel_mgmt_unit_file_t, netlogond_var_run_t, neutron_unit_file_t, neutron_var_run_t, nfsd_unit_file_t, ninfod_run_t, ninfod_unit_file_t, nis_unit_file_t, nmbd_var_run_t, nova_unit_file_t, nova_var_run_t, nrpe_etc_t, nrpe_var_run_t, nscd_unit_file_t, nscd_var_run_t, nsd_var_run_t, nslcd_conf_t, nslcd_var_run_t, ntop_etc_t, ntop_var_run_t, ntp_conf_t, ntpd_unit_file_t, ntpd_var_run_t, numad_unit_file_t, numad_var_run_t, nut_conf_t, nut_unit_file_t, nut_var_run_t, nx_server_var_run_t, oddjob_unit_file_t, oddjob_var_run_t, opafm_var_run_t, openct_var_run_t, opendnssec_conf_t, opendnssec_unit_file_t, opendnssec_var_run_t, openhpid_var_run_t, openshift_var_run_t, opensm_unit_file_t, openvpn_etc_rw_t, openvpn_etc_t, openvpn_var_run_t, openvswitch_rw_t, openvswitch_unit_file_t, openvswitch_var_run_t, openwsman_run_t, openwsman_unit_file_t, oracleasm_conf_t, osad_var_run_t, pads_config_t, pads_var_run_t, pam_var_console_t, pam_var_run_t, passenger_var_run_t, pcp_var_run_t, pcscd_var_run_t, pdns_conf_t, pdns_unit_file_t, pdns_var_run_t, pegasus_conf_t, pegasus_openlmi_storage_var_run_t, pegasus_var_run_t, pesign_unit_file_t, pesign_var_run_t, phc2sys_unit_file_t, pingd_etc_t, piranha_etc_rw_t, piranha_fos_var_run_t, piranha_lvs_var_run_t, piranha_pulse_var_run_t, piranha_web_conf_t, piranha_web_var_run_t, pkcs11proxyd_unit_file_t, pkcs11proxyd_var_run_t, pkcs_slotd_lock_t, pkcs_slotd_unit_file_t, pkcs_slotd_var_run_t, pki_ra_lock_t, pki_ra_var_run_t, pki_tomcat_lock_t, pki_tomcat_unit_file_t, pki_tomcat_var_run_t, pki_tps_lock_t, pki_tps_var_run_t, plymouthd_var_run_t, policykit_var_run_t, polipo_etc_t, polipo_pid_t, polipo_unit_file_t, portmap_var_run_t, portreserve_etc_t, portreserve_var_run_t, postfix_etc_t, postfix_postdrop_t, postfix_var_run_t, postgresql_etc_t, postgresql_lock_t, postgresql_unit_file_t, postgresql_var_run_t, postgrey_etc_t, postgrey_var_run_t, power_unit_file_t, pppd_etc_t, pppd_lock_t, pppd_unit_file_t, pppd_var_run_t, pptp_var_run_t, prelude_audisp_var_run_t, prelude_correlator_config_t, prelude_lml_var_run_t, prelude_var_run_t, print_spool_t, printconf_t, privoxy_var_run_t, proc_t, prosody_unit_file_t, prosody_var_run_t, psad_etc_t, psad_var_run_t, ptal_etc_t, ptal_var_run_t, ptp4l_unit_file_t, pulseaudio_var_run_t, puppet_etc_t, puppet_var_run_t, pwauth_var_run_t, pyicqt_var_run_t, qdiskd_var_run_t, qemu_var_run_t, qmail_etc_t, qpidd_var_run_t, quota_nld_var_run_t, rabbitmq_conf_t, rabbitmq_unit_file_t, rabbitmq_var_lock_t, rabbitmq_var_run_t, radiusd_etc_t, radiusd_unit_file_t, radiusd_var_run_t, radvd_etc_t, radvd_var_run_t, rasdaemon_unit_file_t, rdisc_unit_file_t, readahead_var_run_t, redis_conf_t, redis_unit_file_t, redis_var_run_t, regex_milter_data_t, restorecond_var_run_t, rhev_agentd_unit_file_t, rhev_agentd_var_run_t, rhnsd_conf_t, rhnsd_unit_file_t, rhnsd_var_run_t, rhsmcertd_config_t, rhsmcertd_lock_t, rhsmcertd_var_run_t, ricci_modcluster_var_run_t, ricci_modstorage_lock_t, ricci_var_run_t, rkt_unit_file_t, rlogind_var_run_t, rngd_unit_file_t, rngd_var_run_t, rolekit_unit_file_t, root_t, roundup_var_run_t, rpcbind_unit_file_t, rpcbind_var_run_t, rpcd_lock_t, rpcd_unit_file_t, rpcd_var_run_t, rpm_script_tmp_t, rpm_var_cache_t, rpm_var_lib_t, rpm_var_run_t, rrdcached_var_run_t, rsync_etc_t, rsync_var_run_t, rtas_errd_unit_file_t, rtas_errd_var_lock_t, rtas_errd_var_run_t, samba_etc_t, samba_unit_file_t, sanlk_resetd_unit_file_t, sanlock_conf_t, sanlock_unit_file_t, sanlock_var_run_t, saslauthd_var_run_t, sbd_unit_file_t, sbd_var_run_t, sblim_var_run_t, screen_var_run_t, security_t, selinux_config_t, selinux_login_config_t, semanage_read_lock_t, semanage_store_t, semanage_trans_lock_t, sendmail_var_run_t, sensord_unit_file_t, sensord_var_run_t, setrans_var_run_t, setroubleshoot_var_run_t, shell_exec_t, shorewall_etc_t, shorewall_lock_t, slapd_etc_t, slapd_lock_t, slapd_unit_file_t, slapd_var_run_t, slpd_var_run_t, smbd_var_run_t, smokeping_var_run_t, smsd_var_run_t, snapperd_conf_t, snmpd_var_run_t, snort_etc_t, snort_var_run_t, sosreport_var_run_t, soundd_etc_t, soundd_var_run_t, spamass_milter_data_t, spamd_etc_t, spamd_var_run_t, spc_var_run_t, speech_dispatcher_unit_file_t, squid_conf_t, squid_var_run_t, src_t, srvsvcd_var_run_t, sshd_keygen_unit_file_t, sshd_unit_file_t, sshd_var_run_t, sslh_config_t, sslh_unit_file_t, sslh_var_run_t, sssd_conf_t, sssd_public_t, sssd_unit_file_t, sssd_var_lib_t, sssd_var_run_t, stapserver_var_run_t, stratisd_data_t, stratisd_var_run_t, stunnel_etc_t, stunnel_var_run_t, svc_conf_t, svirt_home_t, svirt_image_t, svirt_tmp_t, svirt_tmpfs_t, svnserve_unit_file_t, svnserve_var_run_t, swat_var_run_t, swift_lock_t, swift_unit_file_t, swift_var_run_t, sysfs_t, syslog_conf_t, syslogd_unit_file_t, syslogd_var_run_t, system_conf_t, system_cronjob_lock_t, system_cronjob_var_run_t, system_db_t, system_dbusd_var_lib_t, system_dbusd_var_run_t, systemd_bootchart_unit_file_t, systemd_bootchart_var_run_t, systemd_gpt_generator_unit_file_t, systemd_home_t, systemd_hwdb_etc_t, systemd_hwdb_unit_file_t, systemd_importd_var_run_t, systemd_logind_inhibit_var_run_t, systemd_logind_sessions_t, systemd_logind_var_run_t, systemd_machined_unit_file_t, systemd_machined_var_run_t, systemd_modules_load_unit_file_t, systemd_networkd_unit_file_t, systemd_networkd_var_run_t, systemd_passwd_var_run_t, systemd_resolved_unit_file_t, systemd_resolved_var_run_t, systemd_rfkill_unit_file_t, systemd_runtime_unit_file_t, systemd_timedated_unit_file_t, systemd_timedated_var_lib_t, systemd_timedated_var_run_t, systemd_unit_file_t, systemd_userdbd_runtime_t, systemd_userdbd_unit_file_t, systemd_vconsole_unit_file_t, tangd_cache_t, tangd_unit_file_t, targetd_unit_file_t, telnetd_var_run_t, textrel_shlib_t, tftpd_etc_t, tftpd_var_run_t, tgtd_var_run_t, thin_aeolus_configserver_var_run_t, thin_var_run_t, timemaster_unit_file_t, timemaster_var_run_t, tlp_unit_file_t, tlp_var_run_t, tmp_t, tmpfs_t, tomcat_unit_file_t, tomcat_var_run_t, tor_etc_t, tor_unit_file_t, tor_var_run_t, tuned_etc_t, tuned_rw_etc_t, tuned_var_run_t, udev_etc_t, udev_var_run_t, ulogd_etc_t, uml_switch_var_run_t, unlabeled_t, usbmuxd_unit_file_t, usbmuxd_var_run_t, user_home_dir_t, useradd_var_run_t, userhelper_conf_t, usr_t, uucpd_lock_t, uucpd_var_run_t, uuidd_var_run_t, var_lib_t, var_lock_t, var_log_t, var_run_t, var_t, varnishd_etc_t, varnishd_var_run_t, varnishlog_var_run_t, vdagent_var_run_t, vhostmd_var_run_t, virt_common_var_run_t, virt_etc_rw_t, virt_etc_t, virt_lock_t, virt_lxc_var_run_t, virt_qemu_ga_var_run_t, virt_var_lib_t, virt_var_run_t, virtd_unit_file_t, virtlogd_etc_t, virtlogd_unit_file_t, virtlogd_var_run_t, vmtools_unit_file_t, vmware_host_pid_t, vmware_pid_t, vmware_sys_conf_t, vnstatd_var_run_t, vpnc_var_run_t, watchdog_var_run_t, wdmd_var_run_t, webalizer_etc_t, winbind_var_run_t, xdm_etc_t, xdm_lock_t, xdm_rw_etc_t, xdm_unit_file_t, xdm_var_lib_t, xdm_var_run_t, xenconsoled_var_run_t, xend_var_run_t, xenstored_var_run_t, xserver_etc_t, xserver_var_run_t, ypbind_unit_file_t, ypbind_var_run_t, yppasswdd_var_run_t, ypserv_conf_t, ypserv_var_run_t, ypxfr_var_run_t, zabbix_var_run_t, zarafa_deliver_var_run_t, zarafa_etc_t, zarafa_gateway_var_run_t, zarafa_ical_var_run_t, zarafa_indexer_var_run_t, zarafa_monitor_var_run_t, zarafa_server_var_run_t, zarafa_spooler_var_run_t, zebra_conf_t, zebra_unit_file_t, zebra_var_run_t, zoneminder_unit_file_t, zoneminder_var_run_t.
Then execute:
restorecon -v 'default'

*****  Plugin catchall (17.1 confidence) suggests   **************************

If you believe that systemd should be allowed read access on the default lnk_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'systemd' --raw | audit2allow -M my-systemd
# semodule -X 300 -i my-systemd.pp

Additional Information:
Source Context                system_u:system_r:init_t:s0
Target Context                unconfined_u:object_r:default_t:s0
Target Objects                default [ lnk_file ]
Source                        systemd
Source Path                   systemd
Port                          <Unknown>
Host                          lakenode
Source RPM Packages           
Target RPM Packages           
SELinux Policy RPM            selinux-policy-targeted-35.15-1.fc35.noarch
Local Policy RPM              selinux-policy-targeted-35.15-1.fc35.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Enforcing
Host Name                     lakenode
Platform                      Linux lakenode 5.16.18-200.fc35.x86_64 #1 SMP
                              PREEMPT Mon Mar 28 14:10:07 UTC 2022 x86_64 x86_64
Alert Count                   1
First Seen                    2022-04-13 04:54:34 EEST
Last Seen                     2022-04-13 04:54:34 EEST
Local ID                      356702e9-0948-481d-816a-71eff625bf4c

Raw Audit Messages
type=AVC msg=audit(1649814874.7:2216): avc:  denied  { read } for  pid=1 comm="systemd" name="default" dev="dm-0" ino=8657111 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:object_r:default_t:s0 tclass=lnk_file permissive=0

Hash: systemd,init_t,default_t,lnk_file,read