Description of problem: SELinux is preventing pool-geoclue from 'search' accesses on the directory net. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that pool-geoclue should be allowed search access on the net directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'pool-geoclue' --raw | audit2allow -M my-poolgeoclue # semodule -X 300 -i my-poolgeoclue.pp Additional Information: Source Context system_u:system_r:geoclue_t:s0 Target Context system_u:object_r:sysctl_net_t:s0 Target Objects net [ dir ] Source pool-geoclue Source Path pool-geoclue Port <Unknown> Host (removed) Source RPM Packages Target RPM Packages SELinux Policy RPM selinux-policy-targeted-37.19-1.fc37.noarch Local Policy RPM selinux-policy-targeted-37.19-1.fc37.noarch Selinux Enabled True Policy Type targeted Enforcing Mode Enforcing Host Name (removed) Platform Linux (removed) 6.2.8-200.fc37.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Mar 22 19:11:02 UTC 2023 x86_64 x86_64 Alert Count 1135 First Seen 2023-03-13 18:55:43 CET Last Seen 2023-04-10 17:21:34 CEST Local ID 7401bcf9-030d-46e8-b2fc-6db116aad873 Raw Audit Messages type=AVC msg=audit(1681140094.512:1435): avc: denied { search } for pid=2061 comm="pool-geoclue" name="net" dev="proc" ino=6930381 scontext=system_u:system_r:geoclue_t:s0 tcontext=system_u:object_r:sysctl_net_t:s0 tclass=dir permissive=0 Hash: pool-geoclue,geoclue_t,sysctl_net_t,dir,search Version-Release number of selected component: selinux-policy-targeted-37.19-1.fc37.noarch Additional info: component: selinux-policy reporter: libreport-2.17.4 hashmarkername: setroubleshoot kernel: 6.2.10-200.fc37.x86_64 type: libreport Potential duplicate: bug 2183310
*** This bug has been marked as a duplicate of bug 2183190 ***