To fix the following denials: type=AVC msg=audit(1540821927.216:215): avc: denied { search } for pid=1726 comm="clamd" name="crypto" dev="proc" ino=68 scontext=system_u:system_r:clamd_t:s0 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir type=AVC msg=audit(1540821927.216:215): avc: denied { read } for pid=1726 comm="clamd" name="fips_enabled" dev="proc" ino=69 scontext=system_u:system_r:clamd_t:s0 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file type=AVC msg=audit(1540821927.216:215): avc: denied { open } for pid=1726 comm="clamd" path="/proc/sys/crypto/fips_enabled" dev="proc" ino=69 scontext=system_u:system_r:clamd_t:s0 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file type=AVC msg=audit(1540821927.216:216): avc: denied { getattr } for pid=1726 comm="clamd" path="/proc/sys/crypto/fips_enabled" dev="proc" ino=69 scontext=system_u:system_r:clamd_t:s0 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file Signed-off-by: Dave Sugar <dsugar@xxxxxxxxxx> --- policy/modules/services/clamav.te | 1 + 1 file changed, 1 insertion(+) diff --git a/policy/modules/services/clamav.te b/policy/modules/services/clamav.te index 5db29776..a2f30133 100644 --- a/policy/modules/services/clamav.te +++ b/policy/modules/services/clamav.te @@ -104,6 +104,7 @@ manage_sock_files_pattern(clamd_t, clamd_var_run_t, clamd_var_run_t) files_pid_filetrans(clamd_t, clamd_var_run_t, { dir file sock_file }) kernel_dontaudit_list_proc(clamd_t) +kernel_read_crypto_sysctls(clamd_t) kernel_read_sysctl(clamd_t) kernel_read_kernel_sysctls(clamd_t) kernel_read_system_state(clamd_t) -- 2.14.4