I'm not sure here if we need to open a new bug for the selinux permissions so here is my temporary selinux patch:
[root@undercloud-0-trunk devel]# cat fix.te
policy_module(fix,1.0.0)
require {
type neutron_t;
type nsfs_t;
type openvswitch_t;
class netlink_generic_socket { connect create getattr getopt setopt };
class file { open read };
}
I'm not sure here if we need to open a new bug for the selinux permissions so here is my temporary selinux patch:
[root@underclou d-0-trunk devel]# cat fix.te
policy_ module( fix,1.0. 0)
require { generic_ socket { connect create getattr getopt setopt };
type neutron_t;
type nsfs_t;
type openvswitch_t;
class netlink_
class file { open read };
}
#============= neutron_t ============== generic_ socket { connect create getattr getopt setopt };
allow neutron_t nsfs_t:file { open read };
#
##============= openvswitch_t ==============
allow openvswitch_t self:netlink_