Bug 579497
Summary: | Regression: After upgrade from RHEL 5.4 to RHEL 5.5, xendomains doesn't autostart domUs due to selinux trouble | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | Troels Arvin <troels> |
Component: | selinux-policy | Assignee: | Miroslav Grepl <mgrepl> |
Status: | CLOSED ERRATA | QA Contact: | Milos Malik <mmalik> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 5.5 | CC: | dkovalsk, dwalsh, jrieden, kbsingh, mmalik, mmcgrath, plyons, redhat-bugzilla, tao, tis, tom, xen-maint, yuzhang |
Target Milestone: | rc | Keywords: | Regression, ZStream |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
After upgrading to Red Hat Enterprise Linux 5.5, the Xen hypervisor was unable to auto-start domains linked to in the /etc/xen/auto/ directory. This was caused by the default Red Hat Enterprise Linux 5.5 SELinux policy preventing the xm daemon from reading symbolic links in the /etc/xen/auto/ directory, with the result that the xm daemon could not start virtual guests. These updated selinux-policy packages contain an updated SELinux policy that allows the xm daemon to correctly read the symbolic links in /etc/xen/auto/. The xm service is now able to auto-start virtual guests upon system startup.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2011-01-13 21:48:52 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 617169 |
Description
Troels Arvin
2010-04-05 15:25:23 UTC
"restorecon -R -v /etc/xen" doesn't seem to help, by the way. More by-the-ways: [root@xenhost ~]# ls -laZ /etc/xen drwx------ root root system_u:object_r:virt_etc_t:s0 . drwxr-xr-x root root system_u:object_r:etc_t:s0 .. drwxr-xr-x root root system_u:object_r:virt_etc_rw_t:s0 auto -rw------- root root system_u:object_r:virt_etc_t:s0 domu1 -rwxr-xr-x root root system_u:object_r:bin_t:s0 qemu-ifup drwxr-xr-x root root system_u:object_r:bin_t:s0 scripts -rw------- root root system_u:object_r:virt_etc_t:s0 domu2 -rw------- root root system_u:object_r:virt_etc_t:s0 domu3 -rw------- root root system_u:object_r:virt_etc_t:s0 domu4 -rw-r--r-- root root system_u:object_r:virt_etc_t:s0 xend-config.sxp -rw-r--r-- root root system_u:object_r:virt_etc_t:s0 xend-pci-permissive.sxp -rw-r--r-- root root system_u:object_r:virt_etc_t:s0 xend-pci-quirks.sxp -rw-r--r-- root root system_u:object_r:virt_etc_t:s0 xmexample1 -rw-r--r-- root root system_u:object_r:virt_etc_t:s0 xmexample2 -rw-r--r-- root root system_u:object_r:virt_etc_t:s0 xmexample.hvm -rw-r--r-- root root system_u:object_r:virt_etc_t:s0 xmexample.vti [root@xenhost ~]# ls -laZ /etc/xen/auto/ drwxr-xr-x root root system_u:object_r:virt_etc_rw_t:s0 . drwx------ root root system_u:object_r:virt_etc_t:s0 .. lrwxrwxrwx root root system_u:object_r:virt_etc_rw_t:s0 domu1 -> ../domu1 lrwxrwxrwx root root system_u:object_r:virt_etc_rw_t:s0 domu2 -> ../domu2 lrwxrwxrwx root root system_u:object_r:virt_etc_rw_t:s0 domu3 -> ../domu3 lrwxrwxrwx root root system_u:object_r:virt_etc_rw_t:s0 domu4 -> ../domu4 Final "by-the-way": [root@xenhost ~]# ls -laZ /usr/sbin/xm -rwxr-xr-x root root system_u:object_r:xm_exec_t:s0 /usr/sbin/xm Miroslav, Add manage_lnk_files_pattern($1, virt_etc_rw_t, virt_etc_rw_t) to virt_manage_config Troels, You can add this policy for now by executing # grep xm_t /var/log/audit/audit.log | audit2allow -M myxen # semodule -i myxen.pp Daniel: Thanks, that made the problem go away. When will this be fixed the regular way with an update of selinux-policy? It will definitely be fixed in RHEL5.6. And I will be putting out previews when Miroslav has prepared a fix. If RHEL5.5 is has a zstream, you can request the fix there. Although I forget whether it has one. *** Bug 592947 has been marked as a duplicate of this bug. *** *** Bug 599540 has been marked as a duplicate of this bug. *** Preview of selinux-policy-2.4.6-280.el5.noarch, which contains the fix, is available on http://people.redhat.com/dwalsh/SELinux/RHEL5/noarch *** Bug 611908 has been marked as a duplicate of this bug. *** Fixed in selinux-policy-2.4.6-281.el5.noarch. Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: After upgrading to Red Hat Enterprise Linux 5.5, the Xen hypervisor was unable to auto-start domains linked to in the /etc/xen/auto/ directory. This was caused by the default Red Hat Enterprise Linux 5.5 SELinux policy preventing the xm daemon from reading the symlinks in the /etc/xen/auto directory, with the result that the xm daemon could not start the virtual guests. These updated selinux-policy packages contain an updated SELinux policy that allows the xm daemon to correctly read the symbolic links in /etc/xen/auto. The xm service is now able to auto-start virtual guests upon system startup. QA verified this bug on RHEL5.5 with the following package: xen-3.0.3-115.el5 selinux-policy-strict-2.4.6-282.el5 selinux-policy-targeted-2.4.6-282.el5 selinux-policy-devel-2.4.6-282.el5 selinux-policy-minimum-2.4.6-282.el5 selinux-policy-mls-2.4.6-282.el5 selinux-policy-2.4.6-282.el5 With the patch, domains could be created automatically after host rebooting. Without the patch, domains couldn't be created. And there are errors logged in /var/log/audit/audit.log. So change this bug to VERIFIED. I don't have Xen virtualization any longer. But before we (recently) switched to KVM, the problem seemed to have gone away, probably due to Xen-relatede package updates. I think this bug can be closed. Technical note updated. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. Diffed Contents: @@ -1 +1 @@ -After upgrading to Red Hat Enterprise Linux 5.5, the Xen hypervisor was unable to auto-start domains linked to in the /etc/xen/auto/ directory. This was caused by the default Red Hat Enterprise Linux 5.5 SELinux policy preventing the xm daemon from reading the symlinks in the /etc/xen/auto directory, with the result that the xm daemon could not start the virtual guests. These updated selinux-policy packages contain an updated SELinux policy that allows the xm daemon to correctly read the symbolic links in /etc/xen/auto. The xm service is now able to auto-start virtual guests upon system startup.+After upgrading to Red Hat Enterprise Linux 5.5, the Xen hypervisor was unable to auto-start domains linked to in the /etc/xen/auto/ directory. This was caused by the default Red Hat Enterprise Linux 5.5 SELinux policy preventing the xm daemon from reading symbolic links in the /etc/xen/auto/ directory, with the result that the xm daemon could not start virtual guests. These updated selinux-policy packages contain an updated SELinux policy that allows the xm daemon to correctly read the symbolic links in /etc/xen/auto/. The xm service is now able to auto-start virtual guests upon system startup. An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHBA-2011-0026.html |