On Tue, 2010-03-30 at 14:07 -0400, Paul Moore wrote: > On Tuesday 30 March 2010 10:45:33 am Daniel J Walsh wrote: > > Paul you are suggesting that I write a MLS rule that says > > > > svirt_t:ANYLEVEL can talk to svirt_t:ANYLEVEL over unix domain sockets. > > > > Which would allow > > > > svirt_t:s0 to talk to svirt_t:s1 Which seems very broken to me. > > Well, based on the domains that were reported earlier in the thread ... > > ># ps -eZ | grep virt > >system_u:system_r:virtd_t:s0-s15:c0.c1023 27344 ? 05:34:47 libvirtd > >system_u:system_r:svirt_t:s0:c1 28549 ? 00:00:01 qemu-kvm > > ... I think you just need to write policy that allows "virtd_t:ANYLEVEL" and > "svirtd_t:ANYLEVEL" to communicate; you shouldn't need to allow > "svirt_t:ANYLEVEL" to communicate with "svirt_t" since only qemu-kvm is > running as "svirt_t" and you are trying to get qemu-kvm and libvirtd to talk. The QEMU/KVM "server child socket" gets labeled svirt_t:s0-s15:c0-c1023 (type of svirt_t and level of the peer, libvirtd_t) So svirt_t needs to talk to svirt_t. That's the whole issue..... -Eric -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.