Description of problem: [root@avon ~(keystone_admin)]# setenforce Enforcing [root@avon ~(keystone_admin)]# neutron net-list Authentication required [root@avon ~(keystone_admin)]# nova list ERROR: The server could not comply with the request since it is either malformed or otherwise incorrect. (HTTP 400) (Request-ID: req-316b43b8-d764-45cf-a4bc-4e98eded52f6) but ... [root@avon ~(keystone_admin)]# setenforce Permissive [root@avon ~(keystone_admin)]# neutron net-list +--------------------------------------+---------+------------------------------------------------------+ | id | name | subnets | +--------------------------------------+---------+------------------------------------------------------+ | 1e0b93d5-4567-45d6-a4d6-5dba9b21eb0e | private | 712e3923-d312-4a4d-8752-f5165257aa50 10.0.0.0/24 | | 7d687647-8674-43d5-a52c-862f83b43871 | public | 6e18adeb-d24f-4f76-ae8e-bf11d246d596 172.24.4.224/28 | +--------------------------------------+---------+------------------------------------------------------+ [root@avon ~(keystone_admin)]# nova list +--------------------------------------+---------------+---------+------------+-------------+---------------------+ | ID | Name | Status | Task State | Power State | Networks | +--------------------------------------+---------------+---------+------------+-------------+---------------------+ | b9ba2eae-20bd-4f62-8620-ebda97cd3b78 | cirros-server | SHUTOFF | None | Shutdown | public=172.24.4.227 | +--------------------------------------+---------------+---------+------------+-------------+---------------------+ The AVC is: # sealert -l 4260d71d-d2b0-4124-a44c-e73dec8f78f3 SELinux is preventing /usr/bin/python2.7 from execute access on the file /usr/sbin/xtables-multi. ***** Plugin catchall (100. confidence) suggests *************************** If you believe that python2.7 should be allowed execute access on the xtables-multi file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep neutron-rootwra /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:neutron_t:s0 Target Context system_u:object_r:iptables_exec_t:s0 Target Objects /usr/sbin/xtables-multi [ file ] Source neutron-rootwra Source Path /usr/bin/python2.7 Port <Unknown> Host avon.home.annexia.org Source RPM Packages python-2.7.5-9.fc19.x86_64 Target RPM Packages iptables-1.4.18-1.fc19.x86_64 Policy RPM selinux-policy-3.12.1-74.16.fc19.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name avon.home.annexia.org Platform Linux avon.home.annexia.org 3.12.7-200.fc19.x86_64 #1 SMP Fri Jan 10 15:32:06 UTC 2014 x86_64 x86_64 Alert Count 29325 First Seen 2013-12-12 16:40:21 GMT Last Seen 2014-01-14 15:42:50 GMT Local ID 4260d71d-d2b0-4124-a44c-e73dec8f78f3 Raw Audit Messages type=AVC msg=audit(1389714170.261:7851): avc: denied { execute } for pid=22037 comm="neutron-rootwra" name="xtables-multi" dev="dm-1" ino=2503252 scontext=system_u:system_r:neutron_t:s0 tcontext=system_u:object_r:iptables_exec_t:s0 tclass=file type=SYSCALL msg=audit(1389714170.261:7851): arch=x86_64 syscall=access success=no exit=EACCES a0=1bd4950 a1=1 a2=306b5bbf88 a3=6962732f7273752f items=0 ppid=22036 pid=22037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 ses=4294967295 tty=(none) comm=neutron-rootwra exe=/usr/bin/python2.7 subj=system_u:system_r:neutron_t:s0 key=(null) Hash: neutron-rootwra,neutron_t,iptables_exec_t,file,execute Version-Release number of selected component (if applicable): python-neutron-2013.2.1-1.fc20.noarch python-neutronclient-2.3.1-2.fc20.noarch (Note these are packages from RDO, the base OS is Fedora 19) How reproducible: 100% Steps to Reproduce: 1. See above.
Needs to be back ported.
(In reply to Miroslav Grepl from comment #1) > Needs to be back ported. Miroslav, if this only affects F19 and is fixed in F20, then you may prefer to close it WONTFIX. I'm intending to upgrade this box to F20 in the near future.
I back ported it. commit ed5eba4faa416a1ffac7ed113608725ca2263599 Author: Lukas Vrabec <lvrabec> Date: Fri Jan 17 12:53:39 2014 +0100 Allow neutron domtrans to iptables
selinux-policy-3.12.1-74.18.fc19 has been submitted as an update for Fedora 19. https://admin.fedoraproject.org/updates/selinux-policy-3.12.1-74.18.fc19
Package selinux-policy-3.12.1-74.18.fc19: * should fix your issue, * was pushed to the Fedora 19 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.12.1-74.18.fc19' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2014-2409/selinux-policy-3.12.1-74.18.fc19 then log in and leave karma (feedback).
selinux-policy-3.12.1-74.18.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.