Note: This is a beta release of Red Hat Bugzilla 5.0. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Also email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback here.
Bug 359631 - KVM guest NFS mount to host AVC denial
Summary: KVM guest NFS mount to host AVC denial
Alias: None
Product: Fedora
Classification: Fedora
Component: selinux-policy
Version: rawhide
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Daniel Walsh
QA Contact: Fedora Extras Quality Assurance
Depends On:
Blocks: K12LTSP
TreeView+ depends on / blocked
Reported: 2007-10-31 04:55 UTC by Warren Togami
Modified: 2008-01-30 19:18 UTC (History)
3 users (show)

Fixed In Version: Current
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2008-01-30 19:18:56 UTC

Attachments (Terms of Use)

Description Warren Togami 2007-10-31 04:55:24 UTC
qemu-kvm invoked manually:
qemu-kvm -hda /dev/null -boot n -net nic -net tap,/etc/qemu-ifup

It NFS mounts mounts its root filesystem from a chroot on the host.  Mount
seemingly works enough for the thin client to operate, but during operation I
see this AVC denial on the host.

type=AVC msg=audit(1193803835.861:74): avc:  denied  { getattr } for  pid=2153
comm="rpc.mountd" path="/dev/kvm" dev=tmpfs ino=5849
scontext=system_u:system_r:nfsd_t:s0 tcontext=system_u:object_r:device_t:s0


Comment 1 Jeremy Katz 2007-10-31 05:33:59 UTC
Are you exporting the server's /dev over NFS?  Because that's what it looks like
and that's almost certainly something you _don't_ want to do as it would let the
LTSP clients muck with things in /dev of the server

Comment 2 Daniel Walsh 2007-10-31 11:55:45 UTC
Well what is /dev/kvm?  It is not labeled.  I have no idea what to label it.  Do
we need a new type?

Comment 3 Jeremy Katz 2007-10-31 12:05:24 UTC
It's the device used for communication between kvm userspace and kernel.  And
since we're not currently doing anything to confine kvm, having it as device_t
is reasonable.

Comment 4 Daniel Walsh 2007-10-31 13:51:34 UTC
Ok I added a kvm_device_t to selinux-policy-3.0.8-43.fc8

Most domains can not look at device_t so it will generate avc;s  if not just for
getattr types.

Comment 5 Daniel Berrange 2007-10-31 14:27:10 UTC
I don't see why  rpc.mounted is trying to open /dev/kvm at all. It has no
business touching that whatsoever. It smells like a leaked file descriptor to me.

Comment 6 Warren Togami 2007-10-31 14:32:07 UTC
leaked file descriptor from what?

Note: This doesn't actually prevent NFS from working.

Comment 7 Daniel Walsh 2007-11-01 17:38:33 UTC
This is most likely rpc.mountd doing a getattr on evey chr_file in /dev.

If it does the equivalent of ls -lZ /dev, you will get this getattr violation.

Existing selinux policy has


The problem is device_t was not considered a valid label for a chr_file so these
dontaudit lines did not take effect.

Comment 8 Daniel Walsh 2008-01-30 19:18:56 UTC
Bulk closing all bugs in Fedora updates in the modified state.  If you bug is
not fixed, please reopen.

Note You need to log in before you can comment on or make changes to this bug.