SELinux is preventing revalidator5 from search access on the directory net. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that revalidator5 should be allowed search access on the net directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # grep revalidator5 /var/log/audit/audit.log | audit2allow -M mypol # semodule -i mypol.pp Additional Information: Source Context system_u:system_r:openvswitch_t:s0 Target Context system_u:object_r:sysctl_net_t:s0 Target Objects net [ dir ] Source revalidator5 Source Path revalidator5 Port <Unknown> Host [scrubbed] Source RPM Packages Target RPM Packages Policy RPM selinux-policy-3.13.1-103.fc21.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name [scrubbed] Platform Linux [scrubbed] 3.17.7-300.fc21.x86_64 #1 SMP Wed Dec 17 03:08:44 UTC 2014 x86_64 x86_64 Alert Count 1 First Seen 2014-12-29 13:05:23 UTC Last Seen 2014-12-29 13:05:23 UTC Local ID 41ce8f3b-0607-474b-914c-c3f8583bb1f9 Raw Audit Messages type=AVC msg=audit(1419858323.8:52): avc: denied { search } for pid=1156 comm="revalidator5" name="net" dev="proc" ino=14340 scontext=system_u:system_r:openvswitch_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=dir permissive=0 Hash: revalidator5,openvswitch_t,sysctl_net_t,dir,search ------------------------------------------------------------------ # grep revalidator5 /var/log/audit/audit.log | audit2allow #============= openvswitch_t ============== allow openvswitch_t sysctl_net_t:dir search;
23a36fc2ba1b716bcf0cb0b752b3c206ed2715d9 fixes this in git.
It looks like file {read} is needed as well. I'm testing this policy locally and will update this ticket once I verify that it works: module raxlive-openvswitch-sysctl 1.0; require { type sysctl_net_t; type openvswitch_t; class file read; class dir search; } #============= openvswitch_t ============== allow openvswitch_t sysctl_net_t:file read; allow openvswitch_t sysctl_net_t:dir search;
Made PR on GitHub: https://github.com/selinux-policy/selinux-policy/pull/10
Verified that the adjustments from the pull request[1] fix the remainder of the issue in this ticket. [1] https://github.com/selinux-policy/selinux-policy/pull/10 Feel free to test/merge.
selinux-policy-3.13.1-105.fc21 has been submitted as an update for Fedora 21. https://admin.fedoraproject.org/updates/selinux-policy-3.13.1-105.fc21
Package selinux-policy-3.13.1-105.fc21: * should fix your issue, * was pushed to the Fedora 21 testing repository, * should be available at your local mirror within two days. Update it with: # su -c 'yum update --enablerepo=updates-testing selinux-policy-3.13.1-105.fc21' as soon as you are able to. Please go to the following url: https://admin.fedoraproject.org/updates/FEDORA-2015-1337/selinux-policy-3.13.1-105.fc21 then log in and leave karma (feedback).
selinux-policy-3.13.1-105.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.