Bug 227199 - SELinux is preventing /usr/libexec/hald-addon-macbookpro-backlight (hald_t) "read write" access to mem (memory_device_t).
SELinux is preventing /usr/libexec/hald-addon-macbookpro-backlight (hald_t) ...
Status: CLOSED CURRENTRELEASE
Product: Fedora
Classification: Fedora
Component: hal (Show other bugs)
6
i686 Linux
medium Severity medium
: ---
: ---
Assigned To: David Zeuthen
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2007-02-03 07:19 EST by Ruben Kerkhof
Modified: 2013-03-05 22:49 EST (History)
2 users (show)

See Also:
Fixed In Version: 2.4.6-37
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2007-02-20 15:05:36 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Ruben Kerkhof 2007-02-03 07:19:51 EST
Output from setroubleshoot:

Additional Information:       

Source Context:               system_u:system_r:hald_t
Target Context:               system_u:object_r:memory_device_t
Target Objects:               mem [ chr_file ]
Affected RPM Packages:        hal-0.5.8.1-6.fc6 [application]
Policy RPM:                   selinux-policy-2.4.6-27.fc6
Selinux Enabled:              True
Policy Type:                  targeted
MLS Enabled:                  True
Enforcing Mode:               Enforcing
Plugin Name:                  plugins.disable_trans
Host Name:                    wodan.marshallplein.nl
Platform:                     Linux wodan.marshallplein.nl 2.6.19-1.2895.fc6 #1
SMP Wed Jan 10 19:28:18 EST 2007 i686 i686
Alert Count:                  1
Line Numbers:                 

Raw Audit Messages:           

avc: denied { read, write } for comm="hald-addon-macb" dev=tmpfs egid=0 euid=0
exe="/usr/libexec/hald-addon-macbookpro-backlight" exit=-13 fsgid=0 fsuid=0
gid=0 items=0 name="mem" pid=2978 scontext=system_u:system_r:hald_t:s0 sgid=0
subj=system_u:system_r:hald_t:s0 suid=0 tclass=chr_file
tcontext=system_u:object_r:memory_device_t:s0 tty=(none) uid=0
Comment 1 Daniel Walsh 2007-02-14 16:06:38 EST
Fixed in selinux-policy-2.4.6-37
Comment 2 Ruben Kerkhof 2007-02-17 09:49:34 EST
Thanks Daniel, it now works on my Macbook.

Note You need to log in before you can comment on or make changes to this bug.