Re: memory_device_t

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Apr 17, 2008 at 6:48 PM, Justin Mattock <justinmattock@xxxxxxxxx> wrote:
> On Thu, Apr 17, 2008 at 6:25 PM, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:
>  >
>  >  On Thu, 2008-04-17 at 14:24 -0400, Stephen Smalley wrote:
>  >  > On Thu, 2008-04-17 at 17:48 +0000, Justin Mattock wrote:
>  >  > > Hello; I have a quick question. When using a macbook pro there is a
>  >  > > tool(radeontool)  that I use to lower the gpu power to a low state
>  >  > > causing significant cooling of the system hardware. The problem I run
>  >  > > into is I'm receiving a: libsepol.check_assertion_helper: assertion on
>  >  > > line 9293 violated by allow sysadm_t memory_device_t:chr_file { read
>  >  > > write };
>  >  > > Whenever trying to write the allow rule into the policy. What would be
>  >  > > the best step to allow this tool?
>  >  >
>  >  > Well, assuming that it actually requires that access, you can override
>  >  > the assertion / neverallow rule by using the proper policy interface
>  >  > instead of a direct allow rule.  audit2allow -R will try to match and
>  >  > use interface calls for you, or you can look them up and use the right
>  >  > one manually.  dev_read_raw_memory() and dev_write_raw_memory() appear
>  >  > to be the ones in question.
>
>      With refpolicy where would I put that info from audit2allow -R?
>
> >
>  >  Oh, but I see that you showed the denial as being on sysadm_t.  You
>  >  should really define a separate domain for the tool and only allow it
>  >  for that domain rather than directly allowing it to sysadm_t.
>
>   First I'll try another domain, then look into the other options,
>
>
>
>
>  >
>  >
>  >  >
>  >  > Or you can disable assertion checking by putting expand-check=0
>  >  > in /etc/selinux/semanage.conf.
>  >  >
>  >  --
>  >  Stephen Smalley
>  >  National Security Agency
>  >
>  >
>
>  Thanks for the help, also a few weeks ago giving me the info on echo 0
>  > /proc/sys/kernel/printk_ratelimit
>  made writting the rules more enjoyable, rather than spending hours.
>
>  --
>  Justin P. Mattock
>



O.K. doing what you said worked by putting that tool in a different
domain, having this tool used early in the boot process i.g. putting
the tool in /usr/sbin, then adding a line to rc.local is working, not
producing any denials, but it is working.
Does this seem correct to you?

Justin P. Mattock

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux