Description of problem: I ran setsebool -P git_system_enable_homedirs 1 and did a restorecon -r on my home directory, but I'm still getting denied access for the git-daemon to ~/public_git. SELinux is preventing /usr/libexec/git-core/git-daemon from 'search' accesses on the directory /home/dshea/public_git. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that git-daemon should be allowed search access on the public_git directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep git-daemon /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:git_system_t:s0 Target Context unconfined_u:object_r:git_user_content_t:s0 Target Objects /home/dshea/public_git [ dir ] Source git-daemon Source Path /usr/libexec/git-core/git-daemon Port <Unknown> Host (removed) Source RPM Packages git-daemon-1.8.4.2-1.fc20.x86_64 Target RPM Packages Policy RPM selinux-policy-3.12.1-90.fc20.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 3.11.9-300.fc20.x86_64 #1 SMP Wed Nov 20 22:23:25 UTC 2013 x86_64 x86_64 Alert Count 5 First Seen 2013-11-25 14:03:38 EST Last Seen 2013-11-25 14:11:21 EST Local ID 6a6668c6-5aa1-455e-9295-df7ac821b0a9 Raw Audit Messages type=AVC msg=audit(1385406681.282:582): avc: denied { search } for pid=3282 comm="git-daemon" name="public_git" dev="dm-3" ino=2367805 scontext=system_u:system_r:git_system_t:s0 tcontext=unconfined_u:object_r:git_user_content_t:s0 tclass=dir type=SYSCALL msg=audit(1385406681.282:582): arch=x86_64 syscall=stat success=no exit=EACCES a0=6c2a00 a1=7fff552aab10 a2=7fff552aab10 a3=7fff552aa8d0 items=0 ppid=1 pid=3282 auid=4294967295 uid=99 gid=99 euid=99 suid=99 fsuid=99 egid=99 sgid=99 fsgid=99 ses=4294967295 tty=(none) comm=git-daemon exe=/usr/libexec/git-core/git-daemon subj=system_u:system_r:git_system_t:s0 key=(null) Hash: git-daemon,git_system_t,git_user_content_t,dir,search Additional info: reporter: libreport-2.1.9 hashmarkername: setroubleshoot kernel: 3.11.9-300.fc20.x86_64 type: libreport
442cb393c150889e0cbebf4c508e9c600e827f32 fixes this in git.
selinux-policy-3.12.1-105.fc20 has been submitted as an update for Fedora 20. https://admin.fedoraproject.org/updates/selinux-policy-3.12.1-105.fc20
Package selinux-policy-3.12.1-105.fc20: * should fix your issue, * was pushed to the Fedora 20 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.12.1-105.fc20' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2013-22285/selinux-policy-3.12.1-105.fc20 then log in and leave karma (feedback).
selinux-policy-3.12.1-105.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.