Bug 447448 - targetted policy blocks vm_applet
targetted policy blocks vm_applet
Status: CLOSED NOTABUG
Product: Fedora
Classification: Fedora
Component: selinux-policy-targeted (Show other bugs)
9
All Linux
low Severity low
: ---
: ---
Assigned To: Daniel Walsh
Ben Levenson
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2008-05-19 18:50 EDT by Martin Ebourne
Modified: 2008-10-05 15:32 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2008-10-05 15:32:08 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Martin Ebourne 2008-05-19 18:50:27 EDT
Description of problem:
With targetted policy active vm_applet was finding none of the configured VMs.

Version-Release number of selected component (if applicable):
selinux-policy-targeted-3.3.1-42.fc9.noarch
gnome-applet-vm-0.2.0-2.fc9.x86_64
libvirt-0.4.2-1.fc9.x86_64

How reproducible:
Every time

Steps to Reproduce:
1. Set up kvm VM using virt-manager
2. Add vm_applet to gnome-panel
3. Click on vm_applet
  
Actual results:

/var/log/messages:
libvirtd: Policy kit denied action org.libvirt.unix.monitor from pid 3132, uid
500, result: no

This is wrong though, policy kit is set up for this action. Real culprit is
targetted policy:

type=AVC msg=audit(1211235888.558:987): avc:  denied  { read } for  pid=2580
comm="libvirtd"
name="org.freedesktop.consolekit.system.stop-multiple-users.defaults-override"
dev=dm-1 ino=469272 scontext=system_u:system_r:virtd_t:s0
tcontext=unconfined_u:object_r:polkit_var_lib_t:s0 tclass=file
type=AVC msg=audit(1211235888.563:988): avc:  denied  { sys_nice } for  pid=2580
comm="libvirtd" capability=23 scontext=system_u:system_r:virtd_t:s0
tcontext=system_u:system_r:virtd_t:s0 tclass=capability

setenforce 0 made it work

Expected results:
Should list configured VMs with selinux active.
Comment 1 Daniel Walsh 2008-05-19 20:19:11 EDT
You can allow this for now.

# audit2allow -M mypol -l -i /var/log/audit/audit.log
# semodule -i mypol.pp

Fixed in selinux-policy-3.3.1-53.fc9.noarch
Comment 2 Martin Ebourne 2008-10-05 15:32:08 EDT
Confirmed this is working now.

Note You need to log in before you can comment on or make changes to this bug.