Re: [CentOS] Fwd: Re: SELinux triggered during Libvirt snapshots

2011-10-19 Thread Trey Dockendorf
On Tue, Oct 18, 2011 at 7:30 AM, Daniel J Walsh dwa...@redhat.com wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 On 10/17/2011 03:40 PM, Trey Dockendorf wrote:
 
  On Oct 17, 2011 2:06 PM, Daniel J Walsh dwa...@redhat.com
  mailto:dwa...@redhat.com wrote:
 
  On 10/17/2011 02:09 PM, Trey Dockendorf wrote:
  On Oct 17, 2011 10:30 AM, Daniel J Walsh dwa...@redhat.com
  mailto:dwa...@redhat.com mailto:dwa...@redhat.com
  mailto:dwa...@redhat.com wrote:
 
  On 10/17/2011 11:19 AM, Trey Dockendorf wrote:
  Forwarding back to list. -- Forwarded message
  -- From: Trey Dockendorf treyd...@gmail.com
  mailto:treyd...@gmail.com mailto:treyd...@gmail.com
  mailto:treyd...@gmail.com Date: Oct
  17, 2011 10:06 AM Subject:
  Re: [CentOS] SELinux triggered during Libvirt snapshots To:
  Daniel J Walsh dwa...@redhat.com mailto:dwa...@redhat.com
  mailto:dwa...@redhat.com mailto:dwa...@redhat.com
 
 
 
  On Mon, Oct 17, 2011 at 7:47 AM, Daniel J Walsh
  dwa...@redhat.com mailto:dwa...@redhat.com
  mailto:dwa...@redhat.com mailto:dwa...@redhat.com wrote:
 
  On 10/14/2011 08:17 PM, Trey Dockendorf wrote:
  I recently began getting periodic emails from SEalert
  that SELinux is preventing /usr/libexec/qemu-kvm
  getattr access from the directory I store all my
  virtual machines for KVM.
 
  All VMs are stored under /vmstore , which is it's own
  mount point, and every file and folder under /vmstore
  currently has the correct context that was set by doing
  the following:
 
  semanage fcontext -a -t virt_image_t /vmstore(/.*)?
  restorecon -R /vmstore
 
  So far I've noticed then when taking snapshots and also
  when using virsh to make changes to a domain's XML file.
  I haven't had any problems for the 3 or 4 months I've
  run this KVM server using SELinux on Enforcing, and so
  I'm not really sure what information is helpful to debug
  this.  The server is CentOS 6 x86_64 updated to CR.  This
  is the raw audit entry, (hostname removed)
 
  node=kvmhost.tld type=AVC msg=audit(1318634450.285:28):
  avc: denied { getattr } for pid=1842 comm=qemu-kvm
  name=/ dev=dm-2 ino=2
  scontext=system_u:system_r:svirt_t:s0:c772,c779
  tcontext=system_u:object_r:fs_t:s0 tclass=filesystem
  node=kvmhost.tld type=SYSCALL
  msg=audit(1318634450.285:28): arch=c03e syscall=138
  success=no exit=-13 a0=9 a1=7fff1cf153f0 a2=0
  a3=7fff1cf15170 items=0 ppid=1 pid=1842 auid=4294967295
  uid=107 gid=107 euid=107 suid=107 fsuid=107 egid=107
  sgid=107 fsgid=107 tty=(none) ses=4294967295
  comm=qemu-kvm exe=/usr/libexec/qemu-kvm
  subj=system_u:system_r:svirt_t:s0:c772,c779 key=(null)
 
  I've attached the alert email as a quote below,
  (hostname removed)
 
  Any help is greatly appreciated, I've had to deal little
  with SELinux fortunately, but at the moment am not
  really sure if my snapshots are actually functional or if
  this is just some false positive.
 
  Thanks - Trey
 
  Summary
 
  SELinux is preventing /usr/libexec/qemu-kvm getattr
  access on /vmstore.
 
  Detailed Description
 
  SELinux denied access requested by qemu-kvm. It is not
  expected that this
  access is required by qemu-kvm and this access may
  signal an intrusion attempt. It is also possible
  that the specific version or configuration of the
  application is causing it to require additional
  access.
 
  Allowing Access
 
  You can generate a local policy module to allow this
  access - see FAQ
  Please file a bug report.
 
  Additional Information
 
  Source Context:
  system_u:system_r:svirt_t:s0:c772,c779
 
  Target Context:   system_u:object_r:fs_t:s0
 
  Target Objects:   /vmstore [ filesystem ]
 
  Source:   qemu-kvm
 
  Source Path:   /usr/libexec/qemu-kvm
 
  Port:   Unknown
 
  Host:   kvmhost.tld
 
  Source RPM Packages:   qemu-kvm-0.12.1.2-2.160.el6_1.8
 
  Target RPM Packages:
 
  Policy RPM:   selinux-policy-3.7.19-93.el6_1.7
 
  Selinux Enabled:   True
 
  Policy Type:   targeted
 
  Enforcing Mode:   Enforcing
 
  Plugin Name:   catchall
 
  Host Name:   kvmhost.tld
 
  Platform:   Linux kvmhost.tld
  2.6.32-71.29.1.el6.x86_64 #1 SMP Mon Jun 27
  19:49:27 BST 2011 x86_64 x86_64
 
  Alert Count:   1
 
  First Seen:   Fri Oct 14 18:20:50 2011
 
  Last Seen:   Fri Oct 14 18:20:50 2011
 
  Local ID:   c73c7440-06ee-4611-80ac-712207ef9aa6
 
  Line Numbers:
 
  Raw Audit Messages :
 
 
  node=kvmhost.tld type=AVC
  msg=audit(1318634450.285:28): avc: denied { getattr
  } for pid=1842 comm=qemu-kvm name=/ dev=dm-2
  ino=2
  scontext=system_u:system_r:svirt_t:s0:c772,c779
  tcontext=system_u:object_r:fs_t:s0 tclass=filesystem
 
  node=kvmhost.tld type=SYSCALL
  msg=audit(1318634450.285:28): arch=c03e
  syscall=138 success=no exit=-13 a0=9 a1=7fff1cf153f0
  a2=0 a3=7fff1cf15170 items=0 ppid=1 pid=1842
  auid=4294967295 uid=107 gid=107 euid=107 suid=107
  fsuid=107 egid=107 sgid=107 fsgid=107 tty=(none)
  ses=4294967295 comm=qemu-kvm
  exe=/usr/libexec/qemu-kvm
  subj=system_u:system_r:svirt_t:s0:c772,c779
  key=(null)
 
 
 

Re: [CentOS] Fwd: Re: SELinux triggered during Libvirt snapshots

2011-10-18 Thread Daniel J Walsh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/17/2011 03:40 PM, Trey Dockendorf wrote:
 
 On Oct 17, 2011 2:06 PM, Daniel J Walsh dwa...@redhat.com 
 mailto:dwa...@redhat.com wrote:
 
 On 10/17/2011 02:09 PM, Trey Dockendorf wrote:
 On Oct 17, 2011 10:30 AM, Daniel J Walsh dwa...@redhat.com 
 mailto:dwa...@redhat.com mailto:dwa...@redhat.com
 mailto:dwa...@redhat.com wrote:
 
 On 10/17/2011 11:19 AM, Trey Dockendorf wrote:
 Forwarding back to list. -- Forwarded message
 -- From: Trey Dockendorf treyd...@gmail.com
 mailto:treyd...@gmail.com mailto:treyd...@gmail.com
 mailto:treyd...@gmail.com Date: Oct
 17, 2011 10:06 AM Subject:
 Re: [CentOS] SELinux triggered during Libvirt snapshots To: 
 Daniel J Walsh dwa...@redhat.com mailto:dwa...@redhat.com
 mailto:dwa...@redhat.com mailto:dwa...@redhat.com
 
 
 
 On Mon, Oct 17, 2011 at 7:47 AM, Daniel J Walsh 
 dwa...@redhat.com mailto:dwa...@redhat.com
 mailto:dwa...@redhat.com mailto:dwa...@redhat.com wrote:
 
 On 10/14/2011 08:17 PM, Trey Dockendorf wrote:
 I recently began getting periodic emails from SEalert
 that SELinux is preventing /usr/libexec/qemu-kvm
 getattr access from the directory I store all my
 virtual machines for KVM.
 
 All VMs are stored under /vmstore , which is it's own 
 mount point, and every file and folder under /vmstore 
 currently has the correct context that was set by doing
 the following:
 
 semanage fcontext -a -t virt_image_t /vmstore(/.*)? 
 restorecon -R /vmstore
 
 So far I've noticed then when taking snapshots and also 
 when using virsh to make changes to a domain's XML file. 
 I haven't had any problems for the 3 or 4 months I've
 run this KVM server using SELinux on Enforcing, and so
 I'm not really sure what information is helpful to debug
 this.  The server is CentOS 6 x86_64 updated to CR.  This
 is the raw audit entry, (hostname removed)
 
 node=kvmhost.tld type=AVC msg=audit(1318634450.285:28): 
 avc: denied { getattr } for pid=1842 comm=qemu-kvm 
 name=/ dev=dm-2 ino=2 
 scontext=system_u:system_r:svirt_t:s0:c772,c779 
 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem 
 node=kvmhost.tld type=SYSCALL 
 msg=audit(1318634450.285:28): arch=c03e syscall=138 
 success=no exit=-13 a0=9 a1=7fff1cf153f0 a2=0 
 a3=7fff1cf15170 items=0 ppid=1 pid=1842 auid=4294967295 
 uid=107 gid=107 euid=107 suid=107 fsuid=107 egid=107 
 sgid=107 fsgid=107 tty=(none) ses=4294967295 
 comm=qemu-kvm exe=/usr/libexec/qemu-kvm 
 subj=system_u:system_r:svirt_t:s0:c772,c779 key=(null)
 
 I've attached the alert email as a quote below,
 (hostname removed)
 
 Any help is greatly appreciated, I've had to deal little 
 with SELinux fortunately, but at the moment am not
 really sure if my snapshots are actually functional or if
 this is just some false positive.
 
 Thanks - Trey
 
 Summary
 
 SELinux is preventing /usr/libexec/qemu-kvm getattr 
 access on /vmstore.
 
 Detailed Description
 
 SELinux denied access requested by qemu-kvm. It is not 
 expected that this
 access is required by qemu-kvm and this access may 
 signal an intrusion attempt. It is also possible
 that the specific version or configuration of the 
 application is causing it to require additional 
 access.
 
 Allowing Access
 
 You can generate a local policy module to allow this 
 access - see FAQ
 Please file a bug report.
 
 Additional Information
 
 Source Context:
 system_u:system_r:svirt_t:s0:c772,c779
 
 Target Context:   system_u:object_r:fs_t:s0
 
 Target Objects:   /vmstore [ filesystem ]
 
 Source:   qemu-kvm
 
 Source Path:   /usr/libexec/qemu-kvm
 
 Port:   Unknown
 
 Host:   kvmhost.tld
 
 Source RPM Packages:   qemu-kvm-0.12.1.2-2.160.el6_1.8
 
 Target RPM Packages:
 
 Policy RPM:   selinux-policy-3.7.19-93.el6_1.7
 
 Selinux Enabled:   True
 
 Policy Type:   targeted
 
 Enforcing Mode:   Enforcing
 
 Plugin Name:   catchall
 
 Host Name:   kvmhost.tld
 
 Platform:   Linux kvmhost.tld
 2.6.32-71.29.1.el6.x86_64 #1 SMP Mon Jun 27
 19:49:27 BST 2011 x86_64 x86_64
 
 Alert Count:   1
 
 First Seen:   Fri Oct 14 18:20:50 2011
 
 Last Seen:   Fri Oct 14 18:20:50 2011
 
 Local ID:   c73c7440-06ee-4611-80ac-712207ef9aa6
 
 Line Numbers:
 
 Raw Audit Messages :
 
 
 node=kvmhost.tld type=AVC 
 msg=audit(1318634450.285:28): avc: denied { getattr
 } for pid=1842 comm=qemu-kvm name=/ dev=dm-2
 ino=2 
 scontext=system_u:system_r:svirt_t:s0:c772,c779 
 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem
 
 node=kvmhost.tld type=SYSCALL 
 msg=audit(1318634450.285:28): arch=c03e
 syscall=138 success=no exit=-13 a0=9 a1=7fff1cf153f0 
 a2=0 a3=7fff1cf15170 items=0 ppid=1 pid=1842 
 auid=4294967295 uid=107 gid=107 euid=107 suid=107 
 fsuid=107 egid=107 sgid=107 fsgid=107 tty=(none) 
 ses=4294967295 comm=qemu-kvm 
 exe=/usr/libexec/qemu-kvm 
 subj=system_u:system_r:svirt_t:s0:c772,c779
 key=(null)
 
 
 
 ___ CentOS 
 mailing list CentOS@centos.org
 mailto:CentOS@centos.org
 mailto:CentOS@centos.org 

[CentOS] Fwd: Re: SELinux triggered during Libvirt snapshots

2011-10-17 Thread Trey Dockendorf
Forwarding back to list.
-- Forwarded message --
From: Trey Dockendorf treyd...@gmail.com
Date: Oct 17, 2011 10:06 AM
Subject: Re: [CentOS] SELinux triggered during Libvirt snapshots
To: Daniel J Walsh dwa...@redhat.com



On Mon, Oct 17, 2011 at 7:47 AM, Daniel J Walsh dwa...@redhat.com wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 On 10/14/2011 08:17 PM, Trey Dockendorf wrote:
  I recently began getting periodic emails from SEalert that SELinux
  is preventing /usr/libexec/qemu-kvm getattr access from the
  directory I store all my virtual machines for KVM.
 
  All VMs are stored under /vmstore , which is it's own mount point,
  and every file and folder under /vmstore currently has the correct
  context that was set by doing the following:
 
  semanage fcontext -a -t virt_image_t /vmstore(/.*)? restorecon -R
  /vmstore
 
  So far I've noticed then when taking snapshots and also when using
  virsh to make changes to a domain's XML file.  I haven't had any
  problems for the 3 or 4 months I've run this KVM server using
  SELinux on Enforcing, and so I'm not really sure what information
  is helpful to debug this.  The server is CentOS 6 x86_64 updated to
  CR.  This is the raw audit entry, (hostname removed)
 
  node=kvmhost.tld type=AVC msg=audit(1318634450.285:28): avc: denied
  { getattr } for pid=1842 comm=qemu-kvm name=/ dev=dm-2 ino=2
  scontext=system_u:system_r:svirt_t:s0:c772,c779
  tcontext=system_u:object_r:fs_t:s0 tclass=filesystem
  node=kvmhost.tld type=SYSCALL msg=audit(1318634450.285:28):
  arch=c03e syscall=138 success=no exit=-13 a0=9 a1=7fff1cf153f0
  a2=0 a3=7fff1cf15170 items=0 ppid=1 pid=1842 auid=4294967295
  uid=107 gid=107 euid=107 suid=107 fsuid=107 egid=107 sgid=107
  fsgid=107 tty=(none) ses=4294967295 comm=qemu-kvm
  exe=/usr/libexec/qemu-kvm
  subj=system_u:system_r:svirt_t:s0:c772,c779 key=(null)
 
  I've attached the alert email as a quote below, (hostname removed)
 
  Any help is greatly appreciated, I've had to deal little with
  SELinux fortunately, but at the moment am not really sure if my
  snapshots are actually functional or if this is just some false
  positive.
 
  Thanks - Trey
 
  Summary
 
  SELinux is preventing /usr/libexec/qemu-kvm getattr access on
  /vmstore.
 
  Detailed Description
 
  SELinux denied access requested by qemu-kvm. It is not expected
  that this
  access is required by qemu-kvm and this access may signal an
  intrusion attempt. It is also possible that the specific
  version or configuration of the application is causing it to
  require additional access.
 
  Allowing Access
 
  You can generate a local policy module to allow this access - see
  FAQ
  Please file a bug report.
 
  Additional Information
 
  Source Context:   system_u:system_r:svirt_t:s0:c772,c779
 
  Target Context:   system_u:object_r:fs_t:s0
 
  Target Objects:   /vmstore [ filesystem ]
 
  Source:   qemu-kvm
 
  Source Path:   /usr/libexec/qemu-kvm
 
  Port:   Unknown
 
  Host:   kvmhost.tld
 
  Source RPM Packages:   qemu-kvm-0.12.1.2-2.160.el6_1.8
 
  Target RPM Packages:
 
  Policy RPM:   selinux-policy-3.7.19-93.el6_1.7
 
  Selinux Enabled:   True
 
  Policy Type:   targeted
 
  Enforcing Mode:   Enforcing
 
  Plugin Name:   catchall
 
  Host Name:   kvmhost.tld
 
  Platform:   Linux kvmhost.tld 2.6.32-71.29.1.el6.x86_64 #1 SMP
  Mon Jun 27
  19:49:27 BST 2011 x86_64 x86_64
 
  Alert Count:   1
 
  First Seen:   Fri Oct 14 18:20:50 2011
 
  Last Seen:   Fri Oct 14 18:20:50 2011
 
  Local ID:   c73c7440-06ee-4611-80ac-712207ef9aa6
 
  Line Numbers:
 
  Raw Audit Messages :
 
 
  node=kvmhost.tld type=AVC msg=audit(1318634450.285:28): avc:
  denied { getattr } for pid=1842 comm=qemu-kvm name=/
  dev=dm-2 ino=2 scontext=system_u:system_r:svirt_t:s0:c772,c779
  tcontext=system_u:object_r:fs_t:s0 tclass=filesystem
 
  node=kvmhost.tld type=SYSCALL msg=audit(1318634450.285:28):
  arch=c03e
  syscall=138 success=no exit=-13 a0=9 a1=7fff1cf153f0 a2=0
  a3=7fff1cf15170 items=0 ppid=1 pid=1842 auid=4294967295 uid=107
  gid=107 euid=107 suid=107 fsuid=107 egid=107 sgid=107 fsgid=107
  tty=(none) ses=4294967295 comm=qemu-kvm
  exe=/usr/libexec/qemu-kvm
  subj=system_u:system_r:svirt_t:s0:c772,c779 key=(null)
 
 
 
  ___ CentOS mailing
  list CentOS@centos.org
  http://lists.centos.org/mailman/listinfo/centos


 THis is a bug in policy.  It can be allowed for now.

 We have 6.2 selinux-policy preview package available on
 http://people.redhat.com/dwalsh/SELinux/RHEL6

 I believe all that is happening is qemu-kvm is noticing you have a
 file system mounted, and doing a getattr on it.
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.11 (GNU/Linux)
 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

 iEYEARECAAYFAk6cI/8ACgkQrlYvE4MpobM6/QCg1qs8iK+dVRsPNVB+QXgr0zEN
 +EMAnAghOHYB4INQ/NH1D4i9k3uJD7Ob
 =TfIB
 -END PGP SIGNATURE-


Thanks for the help Dan.  Is there something that 

Re: [CentOS] Fwd: Re: SELinux triggered during Libvirt snapshots

2011-10-17 Thread Daniel J Walsh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/17/2011 11:19 AM, Trey Dockendorf wrote:
 Forwarding back to list. -- Forwarded message -- 
 From: Trey Dockendorf treyd...@gmail.com Date: Oct 17, 2011
 10:06 AM Subject: Re: [CentOS] SELinux triggered during Libvirt
 snapshots To: Daniel J Walsh dwa...@redhat.com
 
 
 
 On Mon, Oct 17, 2011 at 7:47 AM, Daniel J Walsh dwa...@redhat.com
 wrote:
 
 On 10/14/2011 08:17 PM, Trey Dockendorf wrote:
 I recently began getting periodic emails from SEalert that
 SELinux is preventing /usr/libexec/qemu-kvm getattr access
 from the directory I store all my virtual machines for KVM.
 
 All VMs are stored under /vmstore , which is it's own mount
 point, and every file and folder under /vmstore currently has
 the correct context that was set by doing the following:
 
 semanage fcontext -a -t virt_image_t /vmstore(/.*)?
 restorecon -R /vmstore
 
 So far I've noticed then when taking snapshots and also when
 using virsh to make changes to a domain's XML file.  I
 haven't had any problems for the 3 or 4 months I've run this
 KVM server using SELinux on Enforcing, and so I'm not really
 sure what information is helpful to debug this.  The server
 is CentOS 6 x86_64 updated to CR.  This is the raw audit
 entry, (hostname removed)
 
 node=kvmhost.tld type=AVC msg=audit(1318634450.285:28): avc:
 denied { getattr } for pid=1842 comm=qemu-kvm name=/
 dev=dm-2 ino=2 
 scontext=system_u:system_r:svirt_t:s0:c772,c779 
 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem 
 node=kvmhost.tld type=SYSCALL msg=audit(1318634450.285:28): 
 arch=c03e syscall=138 success=no exit=-13 a0=9
 a1=7fff1cf153f0 a2=0 a3=7fff1cf15170 items=0 ppid=1 pid=1842
 auid=4294967295 uid=107 gid=107 euid=107 suid=107 fsuid=107
 egid=107 sgid=107 fsgid=107 tty=(none) ses=4294967295
 comm=qemu-kvm exe=/usr/libexec/qemu-kvm 
 subj=system_u:system_r:svirt_t:s0:c772,c779 key=(null)
 
 I've attached the alert email as a quote below, (hostname
 removed)
 
 Any help is greatly appreciated, I've had to deal little
 with SELinux fortunately, but at the moment am not really
 sure if my snapshots are actually functional or if this is
 just some false positive.
 
 Thanks - Trey
 
 Summary
 
 SELinux is preventing /usr/libexec/qemu-kvm getattr
 access on /vmstore.
 
 Detailed Description
 
 SELinux denied access requested by qemu-kvm. It is not
 expected that this
 access is required by qemu-kvm and this access may signal
 an intrusion attempt. It is also possible that the
 specific version or configuration of the application is
 causing it to require additional access.
 
 Allowing Access
 
 You can generate a local policy module to allow this access
 - see FAQ
 Please file a bug report.
 
 Additional Information
 
 Source Context:   system_u:system_r:svirt_t:s0:c772,c779
 
 Target Context:   system_u:object_r:fs_t:s0
 
 Target Objects:   /vmstore [ filesystem ]
 
 Source:   qemu-kvm
 
 Source Path:   /usr/libexec/qemu-kvm
 
 Port:   Unknown
 
 Host:   kvmhost.tld
 
 Source RPM Packages:   qemu-kvm-0.12.1.2-2.160.el6_1.8
 
 Target RPM Packages:
 
 Policy RPM:   selinux-policy-3.7.19-93.el6_1.7
 
 Selinux Enabled:   True
 
 Policy Type:   targeted
 
 Enforcing Mode:   Enforcing
 
 Plugin Name:   catchall
 
 Host Name:   kvmhost.tld
 
 Platform:   Linux kvmhost.tld 2.6.32-71.29.1.el6.x86_64 #1
 SMP Mon Jun 27
 19:49:27 BST 2011 x86_64 x86_64
 
 Alert Count:   1
 
 First Seen:   Fri Oct 14 18:20:50 2011
 
 Last Seen:   Fri Oct 14 18:20:50 2011
 
 Local ID:   c73c7440-06ee-4611-80ac-712207ef9aa6
 
 Line Numbers:
 
 Raw Audit Messages :
 
 
 node=kvmhost.tld type=AVC msg=audit(1318634450.285:28):
 avc: denied { getattr } for pid=1842 comm=qemu-kvm
 name=/ dev=dm-2 ino=2
 scontext=system_u:system_r:svirt_t:s0:c772,c779 
 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem
 
 node=kvmhost.tld type=SYSCALL
 msg=audit(1318634450.285:28): arch=c03e
 syscall=138 success=no exit=-13 a0=9 a1=7fff1cf153f0
 a2=0 a3=7fff1cf15170 items=0 ppid=1 pid=1842
 auid=4294967295 uid=107 gid=107 euid=107 suid=107
 fsuid=107 egid=107 sgid=107 fsgid=107 tty=(none)
 ses=4294967295 comm=qemu-kvm 
 exe=/usr/libexec/qemu-kvm 
 subj=system_u:system_r:svirt_t:s0:c772,c779 key=(null)
 
 
 
 ___ CentOS
 mailing list CentOS@centos.org 
 http://lists.centos.org/mailman/listinfo/centos
 
 
 THis is a bug in policy.  It can be allowed for now.
 
 We have 6.2 selinux-policy preview package available on 
 http://people.redhat.com/dwalsh/SELinux/RHEL6
 
 I believe all that is happening is qemu-kvm is noticing you have a 
 file system mounted, and doing a getattr on it.
 
 
 Thanks for the help Dan.  Is there something that could have
 triggered this between 6.0 and 6.1?  This server was updated to 6.0
 CR around the same time this began happening, so I want to make
 sure if it's an issue in CR that I can file a useful bug report.
 
 When updating selinux-policy, do I have to update all the RPMs

Re: [CentOS] Fwd: Re: SELinux triggered during Libvirt snapshots

2011-10-17 Thread Trey Dockendorf
On Oct 17, 2011 10:30 AM, Daniel J Walsh dwa...@redhat.com wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 On 10/17/2011 11:19 AM, Trey Dockendorf wrote:
  Forwarding back to list. -- Forwarded message --
  From: Trey Dockendorf treyd...@gmail.com Date: Oct 17, 2011
  10:06 AM Subject: Re: [CentOS] SELinux triggered during Libvirt
  snapshots To: Daniel J Walsh dwa...@redhat.com
 
 
 
  On Mon, Oct 17, 2011 at 7:47 AM, Daniel J Walsh dwa...@redhat.com
  wrote:
 
  On 10/14/2011 08:17 PM, Trey Dockendorf wrote:
  I recently began getting periodic emails from SEalert that
  SELinux is preventing /usr/libexec/qemu-kvm getattr access
  from the directory I store all my virtual machines for KVM.
 
  All VMs are stored under /vmstore , which is it's own mount
  point, and every file and folder under /vmstore currently has
  the correct context that was set by doing the following:
 
  semanage fcontext -a -t virt_image_t /vmstore(/.*)?
  restorecon -R /vmstore
 
  So far I've noticed then when taking snapshots and also when
  using virsh to make changes to a domain's XML file.  I
  haven't had any problems for the 3 or 4 months I've run this
  KVM server using SELinux on Enforcing, and so I'm not really
  sure what information is helpful to debug this.  The server
  is CentOS 6 x86_64 updated to CR.  This is the raw audit
  entry, (hostname removed)
 
  node=kvmhost.tld type=AVC msg=audit(1318634450.285:28): avc:
  denied { getattr } for pid=1842 comm=qemu-kvm name=/
  dev=dm-2 ino=2
  scontext=system_u:system_r:svirt_t:s0:c772,c779
  tcontext=system_u:object_r:fs_t:s0 tclass=filesystem
  node=kvmhost.tld type=SYSCALL msg=audit(1318634450.285:28):
  arch=c03e syscall=138 success=no exit=-13 a0=9
  a1=7fff1cf153f0 a2=0 a3=7fff1cf15170 items=0 ppid=1 pid=1842
  auid=4294967295 uid=107 gid=107 euid=107 suid=107 fsuid=107
  egid=107 sgid=107 fsgid=107 tty=(none) ses=4294967295
  comm=qemu-kvm exe=/usr/libexec/qemu-kvm
  subj=system_u:system_r:svirt_t:s0:c772,c779 key=(null)
 
  I've attached the alert email as a quote below, (hostname
  removed)
 
  Any help is greatly appreciated, I've had to deal little
  with SELinux fortunately, but at the moment am not really
  sure if my snapshots are actually functional or if this is
  just some false positive.
 
  Thanks - Trey
 
  Summary
 
  SELinux is preventing /usr/libexec/qemu-kvm getattr
  access on /vmstore.
 
  Detailed Description
 
  SELinux denied access requested by qemu-kvm. It is not
  expected that this
  access is required by qemu-kvm and this access may signal
  an intrusion attempt. It is also possible that the
  specific version or configuration of the application is
  causing it to require additional access.
 
  Allowing Access
 
  You can generate a local policy module to allow this access
  - see FAQ
  Please file a bug report.
 
  Additional Information
 
  Source Context:   system_u:system_r:svirt_t:s0:c772,c779
 
  Target Context:   system_u:object_r:fs_t:s0
 
  Target Objects:   /vmstore [ filesystem ]
 
  Source:   qemu-kvm
 
  Source Path:   /usr/libexec/qemu-kvm
 
  Port:   Unknown
 
  Host:   kvmhost.tld
 
  Source RPM Packages:   qemu-kvm-0.12.1.2-2.160.el6_1.8
 
  Target RPM Packages:
 
  Policy RPM:   selinux-policy-3.7.19-93.el6_1.7
 
  Selinux Enabled:   True
 
  Policy Type:   targeted
 
  Enforcing Mode:   Enforcing
 
  Plugin Name:   catchall
 
  Host Name:   kvmhost.tld
 
  Platform:   Linux kvmhost.tld 2.6.32-71.29.1.el6.x86_64 #1
  SMP Mon Jun 27
  19:49:27 BST 2011 x86_64 x86_64
 
  Alert Count:   1
 
  First Seen:   Fri Oct 14 18:20:50 2011
 
  Last Seen:   Fri Oct 14 18:20:50 2011
 
  Local ID:   c73c7440-06ee-4611-80ac-712207ef9aa6
 
  Line Numbers:
 
  Raw Audit Messages :
 
 
  node=kvmhost.tld type=AVC msg=audit(1318634450.285:28):
  avc: denied { getattr } for pid=1842 comm=qemu-kvm
  name=/ dev=dm-2 ino=2
  scontext=system_u:system_r:svirt_t:s0:c772,c779
  tcontext=system_u:object_r:fs_t:s0 tclass=filesystem
 
  node=kvmhost.tld type=SYSCALL
  msg=audit(1318634450.285:28): arch=c03e
  syscall=138 success=no exit=-13 a0=9 a1=7fff1cf153f0
  a2=0 a3=7fff1cf15170 items=0 ppid=1 pid=1842
  auid=4294967295 uid=107 gid=107 euid=107 suid=107
  fsuid=107 egid=107 sgid=107 fsgid=107 tty=(none)
  ses=4294967295 comm=qemu-kvm
  exe=/usr/libexec/qemu-kvm
  subj=system_u:system_r:svirt_t:s0:c772,c779 key=(null)
 
 
 
  ___ CentOS
  mailing list CentOS@centos.org
  http://lists.centos.org/mailman/listinfo/centos
 
 
  THis is a bug in policy.  It can be allowed for now.
 
  We have 6.2 selinux-policy preview package available on
  http://people.redhat.com/dwalsh/SELinux/RHEL6
 
  I believe all that is happening is qemu-kvm is noticing you have a
  file system mounted, and doing a getattr on it.
 
 
  Thanks for the help Dan.  Is there something that could have
  triggered this between 6.0 and 6.1?  This server was updated to 6.0
  CR around the same time this 

Re: [CentOS] Fwd: Re: SELinux triggered during Libvirt snapshots

2011-10-17 Thread Daniel J Walsh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 10/17/2011 02:09 PM, Trey Dockendorf wrote:
 On Oct 17, 2011 10:30 AM, Daniel J Walsh dwa...@redhat.com 
 mailto:dwa...@redhat.com wrote:
 
 On 10/17/2011 11:19 AM, Trey Dockendorf wrote:
 Forwarding back to list. -- Forwarded message -- 
 From: Trey Dockendorf treyd...@gmail.com 
 mailto:treyd...@gmail.com Date: Oct 17, 2011 10:06 AM Subject:
 Re: [CentOS] SELinux triggered during Libvirt snapshots To:
 Daniel J Walsh dwa...@redhat.com mailto:dwa...@redhat.com
 
 
 
 On Mon, Oct 17, 2011 at 7:47 AM, Daniel J Walsh
 dwa...@redhat.com mailto:dwa...@redhat.com wrote:
 
 On 10/14/2011 08:17 PM, Trey Dockendorf wrote:
 I recently began getting periodic emails from SEalert that 
 SELinux is preventing /usr/libexec/qemu-kvm getattr
 access from the directory I store all my virtual machines
 for KVM.
 
 All VMs are stored under /vmstore , which is it's own
 mount point, and every file and folder under /vmstore
 currently has the correct context that was set by doing the
 following:
 
 semanage fcontext -a -t virt_image_t /vmstore(/.*)? 
 restorecon -R /vmstore
 
 So far I've noticed then when taking snapshots and also
 when using virsh to make changes to a domain's XML file.
 I haven't had any problems for the 3 or 4 months I've run
 this KVM server using SELinux on Enforcing, and so I'm not
 really sure what information is helpful to debug this.  The
 server is CentOS 6 x86_64 updated to CR.  This is the raw
 audit entry, (hostname removed)
 
 node=kvmhost.tld type=AVC msg=audit(1318634450.285:28):
 avc: denied { getattr } for pid=1842 comm=qemu-kvm
 name=/ dev=dm-2 ino=2 
 scontext=system_u:system_r:svirt_t:s0:c772,c779 
 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem 
 node=kvmhost.tld type=SYSCALL
 msg=audit(1318634450.285:28): arch=c03e syscall=138
 success=no exit=-13 a0=9 a1=7fff1cf153f0 a2=0
 a3=7fff1cf15170 items=0 ppid=1 pid=1842 auid=4294967295
 uid=107 gid=107 euid=107 suid=107 fsuid=107 egid=107
 sgid=107 fsgid=107 tty=(none) ses=4294967295 
 comm=qemu-kvm exe=/usr/libexec/qemu-kvm 
 subj=system_u:system_r:svirt_t:s0:c772,c779 key=(null)
 
 I've attached the alert email as a quote below, (hostname 
 removed)
 
 Any help is greatly appreciated, I've had to deal little 
 with SELinux fortunately, but at the moment am not really 
 sure if my snapshots are actually functional or if this is 
 just some false positive.
 
 Thanks - Trey
 
 Summary
 
 SELinux is preventing /usr/libexec/qemu-kvm getattr 
 access on /vmstore.
 
 Detailed Description
 
 SELinux denied access requested by qemu-kvm. It is not 
 expected that this
 access is required by qemu-kvm and this access may
 signal an intrusion attempt. It is also possible that
 the specific version or configuration of the
 application is causing it to require additional
 access.
 
 Allowing Access
 
 You can generate a local policy module to allow this
 access - see FAQ
 Please file a bug report.
 
 Additional Information
 
 Source Context:   system_u:system_r:svirt_t:s0:c772,c779
 
 Target Context:   system_u:object_r:fs_t:s0
 
 Target Objects:   /vmstore [ filesystem ]
 
 Source:   qemu-kvm
 
 Source Path:   /usr/libexec/qemu-kvm
 
 Port:   Unknown
 
 Host:   kvmhost.tld
 
 Source RPM Packages:   qemu-kvm-0.12.1.2-2.160.el6_1.8
 
 Target RPM Packages:
 
 Policy RPM:   selinux-policy-3.7.19-93.el6_1.7
 
 Selinux Enabled:   True
 
 Policy Type:   targeted
 
 Enforcing Mode:   Enforcing
 
 Plugin Name:   catchall
 
 Host Name:   kvmhost.tld
 
 Platform:   Linux kvmhost.tld 2.6.32-71.29.1.el6.x86_64
 #1 SMP Mon Jun 27
 19:49:27 BST 2011 x86_64 x86_64
 
 Alert Count:   1
 
 First Seen:   Fri Oct 14 18:20:50 2011
 
 Last Seen:   Fri Oct 14 18:20:50 2011
 
 Local ID:   c73c7440-06ee-4611-80ac-712207ef9aa6
 
 Line Numbers:
 
 Raw Audit Messages :
 
 
 node=kvmhost.tld type=AVC
 msg=audit(1318634450.285:28): avc: denied { getattr }
 for pid=1842 comm=qemu-kvm name=/ dev=dm-2 ino=2 
 scontext=system_u:system_r:svirt_t:s0:c772,c779 
 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem
 
 node=kvmhost.tld type=SYSCALL 
 msg=audit(1318634450.285:28): arch=c03e
 syscall=138 success=no exit=-13 a0=9 a1=7fff1cf153f0 
 a2=0 a3=7fff1cf15170 items=0 ppid=1 pid=1842 
 auid=4294967295 uid=107 gid=107 euid=107 suid=107 
 fsuid=107 egid=107 sgid=107 fsgid=107 tty=(none) 
 ses=4294967295 comm=qemu-kvm 
 exe=/usr/libexec/qemu-kvm 
 subj=system_u:system_r:svirt_t:s0:c772,c779 key=(null)
 
 
 
 ___ CentOS 
 mailing list CentOS@centos.org mailto:CentOS@centos.org 
 http://lists.centos.org/mailman/listinfo/centos
 
 
 THis is a bug in policy.  It can be allowed for now.
 
 We have 6.2 selinux-policy preview package available on 
 http://people.redhat.com/dwalsh/SELinux/RHEL6
 
 I believe all that is happening is qemu-kvm is noticing you have
 a file system mounted, and doing a getattr on it.
 
 
 Thanks for the help Dan.  Is there something that could have 
 

Re: [CentOS] Fwd: Re: SELinux triggered during Libvirt snapshots

2011-10-17 Thread Trey Dockendorf
On Oct 17, 2011 2:06 PM, Daniel J Walsh dwa...@redhat.com wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 On 10/17/2011 02:09 PM, Trey Dockendorf wrote:
  On Oct 17, 2011 10:30 AM, Daniel J Walsh dwa...@redhat.com
  mailto:dwa...@redhat.com wrote:
 
  On 10/17/2011 11:19 AM, Trey Dockendorf wrote:
  Forwarding back to list. -- Forwarded message --
  From: Trey Dockendorf treyd...@gmail.com
  mailto:treyd...@gmail.com Date: Oct 17, 2011 10:06 AM Subject:
  Re: [CentOS] SELinux triggered during Libvirt snapshots To:
  Daniel J Walsh dwa...@redhat.com mailto:dwa...@redhat.com
 
 
 
  On Mon, Oct 17, 2011 at 7:47 AM, Daniel J Walsh
  dwa...@redhat.com mailto:dwa...@redhat.com wrote:
 
  On 10/14/2011 08:17 PM, Trey Dockendorf wrote:
  I recently began getting periodic emails from SEalert that
  SELinux is preventing /usr/libexec/qemu-kvm getattr
  access from the directory I store all my virtual machines
  for KVM.
 
  All VMs are stored under /vmstore , which is it's own
  mount point, and every file and folder under /vmstore
  currently has the correct context that was set by doing the
  following:
 
  semanage fcontext -a -t virt_image_t /vmstore(/.*)?
  restorecon -R /vmstore
 
  So far I've noticed then when taking snapshots and also
  when using virsh to make changes to a domain's XML file.
  I haven't had any problems for the 3 or 4 months I've run
  this KVM server using SELinux on Enforcing, and so I'm not
  really sure what information is helpful to debug this.  The
  server is CentOS 6 x86_64 updated to CR.  This is the raw
  audit entry, (hostname removed)
 
  node=kvmhost.tld type=AVC msg=audit(1318634450.285:28):
  avc: denied { getattr } for pid=1842 comm=qemu-kvm
  name=/ dev=dm-2 ino=2
  scontext=system_u:system_r:svirt_t:s0:c772,c779
  tcontext=system_u:object_r:fs_t:s0 tclass=filesystem
  node=kvmhost.tld type=SYSCALL
  msg=audit(1318634450.285:28): arch=c03e syscall=138
  success=no exit=-13 a0=9 a1=7fff1cf153f0 a2=0
  a3=7fff1cf15170 items=0 ppid=1 pid=1842 auid=4294967295
  uid=107 gid=107 euid=107 suid=107 fsuid=107 egid=107
  sgid=107 fsgid=107 tty=(none) ses=4294967295
  comm=qemu-kvm exe=/usr/libexec/qemu-kvm
  subj=system_u:system_r:svirt_t:s0:c772,c779 key=(null)
 
  I've attached the alert email as a quote below, (hostname
  removed)
 
  Any help is greatly appreciated, I've had to deal little
  with SELinux fortunately, but at the moment am not really
  sure if my snapshots are actually functional or if this is
  just some false positive.
 
  Thanks - Trey
 
  Summary
 
  SELinux is preventing /usr/libexec/qemu-kvm getattr
  access on /vmstore.
 
  Detailed Description
 
  SELinux denied access requested by qemu-kvm. It is not
  expected that this
  access is required by qemu-kvm and this access may
  signal an intrusion attempt. It is also possible that
  the specific version or configuration of the
  application is causing it to require additional
  access.
 
  Allowing Access
 
  You can generate a local policy module to allow this
  access - see FAQ
  Please file a bug report.
 
  Additional Information
 
  Source Context:   system_u:system_r:svirt_t:s0:c772,c779
 
  Target Context:   system_u:object_r:fs_t:s0
 
  Target Objects:   /vmstore [ filesystem ]
 
  Source:   qemu-kvm
 
  Source Path:   /usr/libexec/qemu-kvm
 
  Port:   Unknown
 
  Host:   kvmhost.tld
 
  Source RPM Packages:   qemu-kvm-0.12.1.2-2.160.el6_1.8
 
  Target RPM Packages:
 
  Policy RPM:   selinux-policy-3.7.19-93.el6_1.7
 
  Selinux Enabled:   True
 
  Policy Type:   targeted
 
  Enforcing Mode:   Enforcing
 
  Plugin Name:   catchall
 
  Host Name:   kvmhost.tld
 
  Platform:   Linux kvmhost.tld 2.6.32-71.29.1.el6.x86_64
  #1 SMP Mon Jun 27
  19:49:27 BST 2011 x86_64 x86_64
 
  Alert Count:   1
 
  First Seen:   Fri Oct 14 18:20:50 2011
 
  Last Seen:   Fri Oct 14 18:20:50 2011
 
  Local ID:   c73c7440-06ee-4611-80ac-712207ef9aa6
 
  Line Numbers:
 
  Raw Audit Messages :
 
 
  node=kvmhost.tld type=AVC
  msg=audit(1318634450.285:28): avc: denied { getattr }
  for pid=1842 comm=qemu-kvm name=/ dev=dm-2 ino=2
  scontext=system_u:system_r:svirt_t:s0:c772,c779
  tcontext=system_u:object_r:fs_t:s0 tclass=filesystem
 
  node=kvmhost.tld type=SYSCALL
  msg=audit(1318634450.285:28): arch=c03e
  syscall=138 success=no exit=-13 a0=9 a1=7fff1cf153f0
  a2=0 a3=7fff1cf15170 items=0 ppid=1 pid=1842
  auid=4294967295 uid=107 gid=107 euid=107 suid=107
  fsuid=107 egid=107 sgid=107 fsgid=107 tty=(none)
  ses=4294967295 comm=qemu-kvm
  exe=/usr/libexec/qemu-kvm
  subj=system_u:system_r:svirt_t:s0:c772,c779 key=(null)
 
 
 
  ___ CentOS
  mailing list CentOS@centos.org mailto:CentOS@centos.org
  http://lists.centos.org/mailman/listinfo/centos
 
 
  THis is a bug in policy.  It can be allowed for now.
 
  We have 6.2 selinux-policy preview package available on
  http://people.redhat.com/dwalsh/SELinux/RHEL6
 
  I believe all that is happening