Additional info: libreport version: 2.0.18 kernel: 3.6.10-2.fc17.x86_64 description: :SELinux is preventing /usr/bin/qemu-system-x86_64 from 'getattr' accesses on the filesystem /mnt/C810C15310C148E0. : :***** Plugin catchall (100. confidence) suggests *************************** : :If you believe that qemu-system-x86_64 should be allowed getattr access on the C810C15310C148E0 filesystem by default. :Then you should report this as a bug. :You can generate a local policy module to allow this access. :Do :allow this access for now by executing: :# grep qemu-system-x86 /var/log/audit/audit.log | audit2allow -M mypol :# semodule -i mypol.pp : :Additional Information: :Source Context system_u:system_r:svirt_t:s0:c335,c579 :Target Context system_u:object_r:fusefs_t:s0 :Target Objects /mnt/C810C15310C148E0 [ filesystem ] :Source qemu-system-x86 :Source Path /usr/bin/qemu-system-x86_64 :Port <Unknown> :Host (removed) :Source RPM Packages qemu-system-x86-1.0.1-2.fc17.x86_64 :Target RPM Packages :Policy RPM selinux-policy-3.10.0-161.fc17.noarch :Selinux Enabled True :Policy Type targeted :Enforcing Mode Permissive :Host Name (removed) :Platform Linux (removed) 3.6.10-2.fc17.x86_64 #1 SMP Tue : Dec 11 18:07:34 UTC 2012 x86_64 x86_64 :Alert Count 1 :First Seen 2013-01-07 01:48:12 MMT :Last Seen 2013-01-07 01:48:12 MMT :Local ID 59ceccb9-d632-4b01-b191-2d600e93a97b : :Raw Audit Messages :type=AVC msg=audit(1357499892.283:260): avc: denied { getattr } for pid=15853 comm="qemu-system-x86" name="/" dev="sda3" ino=5 scontext=system_u:system_r:svirt_t:s0:c335,c579 tcontext=system_u:object_r:fusefs_t:s0 tclass=filesystem : : :type=SYSCALL msg=audit(1357499892.283:260): arch=x86_64 syscall=fstatfs success=yes exit=0 a0=f a1=7fffb949f450 a2=0 a3=48 items=0 ppid=1 pid=15853 auid=4294967295 uid=107 gid=107 euid=107 suid=107 fsuid=107 egid=107 sgid=107 fsgid=107 tty=(none) ses=4294967295 comm=qemu-system-x86 exe=/usr/bin/qemu-system-x86_64 subj=system_u:system_r:svirt_t:s0:c335,c579 key=(null) : :Hash: qemu-system-x86,svirt_t,fusefs_t,filesystem,getattr : :audit2allow : :#============= svirt_t ============== :#!!!! This avc can be allowed using the boolean 'virt_use_fusefs' : :allow svirt_t fusefs_t:filesystem getattr; : :audit2allow -R : :#============= svirt_t ============== :#!!!! This avc can be allowed using the boolean 'virt_use_fusefs' : :allow svirt_t fusefs_t:filesystem getattr; :
Created attachment 673451 [details] File: type
Created attachment 673452 [details] File: hashmarkername
:#============= svirt_t ============== :#!!!! This avc can be allowed using the boolean 'virt_use_fusefs' : :allow svirt_t fusefs_t:filesystem getattr; So you need to run # setsebool -P virt_use_fusefs 1 to make this working.