From: jason@perfinion.com (Jason Zaman) Date: Sat, 5 Sep 2015 21:43:49 +0800 Subject: [refpolicy] [PATCH v2 2/2] virt: Allow creating qemu guest agent socket In-Reply-To: <1441460629-21551-1-git-send-email-jason@perfinion.com> References: <1441460629-21551-1-git-send-email-jason@perfinion.com> Message-ID: <1441460629-21551-2-git-send-email-jason@perfinion.com> To: refpolicy@oss.tresys.com List-Id: refpolicy.oss.tresys.com This is needed for the host side guest agent socket for qemu. type=AVC msg=audit(1441210375.086:110241): avc: denied { create } for pid=25153 comm="libvirtd" scontext=system_u:system_r:virtd_t:s0-s0:c0.c1023 tcontext=system_u:system_r:svirt_t:s0:c110,c185 tclass=unix_stream_socket permissive=0 --- virt.te | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/virt.te b/virt.te index ccc83a2..efb0096 100644 --- a/virt.te +++ b/virt.te @@ -465,7 +465,7 @@ allow virtd_t self:netlink_route_socket nlmsg_write; allow virtd_t virt_domain:process { getattr getsched setsched transition signal signull sigkill }; dontaudit virtd_t virt_domain:process { siginh noatsecure rlimitinh }; -allow virtd_t svirt_lxc_domain:unix_stream_socket { create_stream_socket_perms connectto }; +allow virtd_t { virt_domain svirt_lxc_domain }:unix_stream_socket { create_stream_socket_perms connectto }; allow virtd_t svirt_lxc_domain:process signal_perms; allow virtd_t virtd_lxc_t:process { signal signull sigkill }; -- 2.4.6