On Mon, 2019-02-25 at 23:37 +0000, Sugar, David wrote: > type=AVC msg=audit(1550894180.137:3099): avc: denied { search } > for pid=11039 comm="freshclam" name="crypto" dev="proc" ino=208 > scontext=sysadm_u:sysadm_r:freshclam_t:s0-s0:c0.c1023 > tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=1 > type=AVC msg=audit(1550894180.137:3099): avc: denied { read } > for pid=11039 comm="freshclam" name="fips_enabled" dev="proc" > ino=209 scontext=sysadm_u:sysadm_r:freshclam_t:s0-s0:c0.c1023 > tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file > permissive=1 > type=AVC msg=audit(1550894180.137:3099): avc: denied { open } > for pid=11039 comm="freshclam" path="/proc/sys/crypto/fips_enabled" > dev="proc" ino=209 scontext=sysadm_u:sysadm_r:freshclam_t:s0- > s0:c0.c1023 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=file > permissive=1 > > Signed-off-by: Dave Sugar <dsugar@xxxxxxxxxx> > --- > policy/modules/services/clamav.te | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/policy/modules/services/clamav.te > b/policy/modules/services/clamav.te > index 622453e3..db4e0209 100644 > --- a/policy/modules/services/clamav.te > +++ b/policy/modules/services/clamav.te > @@ -202,6 +202,7 @@ stream_connect_pattern(freshclam_t, > clamd_var_run_t, clamd_var_run_t, clamd_t) > read_files_pattern(freshclam_t, clamd_var_log_t, clamd_var_log_t) > > kernel_dontaudit_list_proc(freshclam_t) > +kernel_read_crypto_sysctls(freshclam_t) > kernel_read_kernel_sysctls(freshclam_t) > kernel_read_network_state(freshclam_t) > kernel_read_system_state(freshclam_t) Merged. -- Chris PeBenito