|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] XSM denials with 4.7.0 RC1
On 5/4/16 2:39 PM, Konrad Rzeszutek Wilk wrote:
>>
>> Well it turns out yes I was using a bad policy. I grabbed the policy
>> updates from master and not from 4.7.0-rc1 when I merged them with my
>> policy. So yes the above are incorrect and noise on my part. master
>> wasn't (and still isn't) at the same point that 4.7.0-rc1 was at.
>>
>>>
>>>> (XEN) avc: denied { xen_commandline } for domid=1
>>>> scontext=system_u:system_r:domU_t tcontext=system_u:system_r:xen_t
>>>> tclass=version
>>>> (XEN) avc: denied { xen_build_id } for domid=1
>>>> scontext=system_u:system_r:domU_t tcontext=system_u:system_r:xen_t
>>>> tclass=version
>>>
>>> If these show up for domUs in normal operation (and I think using
>>> "xl devd" probably qualifies for that), then they probably need
>>> dontaudit rules.
>>>
>>
>> These are still happening for any domD running "xl devd".
>
> Is 'domD' not part of domain_type?
>
> As in the policy has:
>
> allow domain_type xen_t:version {
>
> xen_extraversion xen_compile_info xen_capabilities
>
> xen_changeset xen_pagesize xen_guest_handle
>
> };
>
> Is domD under a different type? In which case it sounds as if you
> are using a non-default XSM policy?
>
I'm calling it domD (since I'm passing a device into it) but its a domU.
Ignore my wording. I've got a few extra allows at the bottom of the
default policy to allow a PCI device to be passed in.
--
Doug Goldstein
Attachment:
signature.asc _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |