Bug 967059 - AVC denials when starting a guest
AVC denials when starting a guest
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: selinux-policy (Show other bugs)
All Linux
unspecified Severity unspecified
: rc
: ---
Assigned To: Miroslav Grepl
BaseOS QE Security Team
Depends On:
  Show dependency treegraph
Reported: 2013-05-24 11:29 EDT by Gurhan Ozen
Modified: 2013-11-03 21:03 EST (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2013-06-04 16:23:37 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Gurhan Ozen 2013-05-24 11:29:08 EDT
Description of problem:
When running virt workflow, we're getting the following AVC error:

type=AVC msg=audit(1369347825.490:22): avc:  denied  { read write } for  pid=7136 comm="virsh" path="/dev/ptmx" dev=tmpfs ino=1102 scontext=system_u:system_r:xm_t:s0 tcontext=system_u:object_r:ptmx_t:s0 tclass=chr_file

You can see an example job here: https://beaker.engineering.redhat.com/jobs/422183 

Version-Release number of selected component (if applicable):

How reproducible:

Steps to Reproduce:
1. You can try to clone the job or one of the recipesets in it.

Actual results:

Expected results:

Additional info:
Comment 1 Milos Malik 2013-05-27 02:15:38 EDT
It seems that the AVC appeared in enforcing mode, but success=yes. Could it be a leaked file descriptor?
Comment 2 RHEL Product and Program Management 2013-05-27 02:36:33 EDT
This request was evaluated by Red Hat Product Management for inclusion
in a Red Hat Enterprise Linux release.  Product Management has
requested further review of this request by Red Hat Engineering, for
potential inclusion in a Red Hat Enterprise Linux release for currently
deployed products.  This request is not yet committed for inclusion in
a release.
Comment 3 Gurhan Ozen 2013-05-29 10:24:32 EDT
(In reply to Milos Malik from comment #1)
> It seems that the AVC appeared in enforcing mode, but success=yes. Could it
> be a leaked file descriptor?

Yes, it turns out that this might be caused by one of the test helpers in which for each guest we're forking a pty to execute virsh console $guest on it and there could be leaked file descriptors during this process. Just testing our fix and will update this once it's done.
Comment 4 Daniel Walsh 2013-06-04 16:23:37 EDT
If you run ausearch -m avc -i and it says the syscall is execv, it is almost always a leaked file descriptor.

Note You need to log in before you can comment on or make changes to this bug.