kudzu (kmodule) and /dev/zero: latest rawhide issues....
Russell Coker
russell at coker.com.au
Tue Nov 23 04:11:25 UTC 2004
On Tuesday 09 November 2004 03:40, Tom London <selinux at gmail.com> wrote:
> Adding
> allow kudzu_t memory_device_t:chr_file { read write };
> produces
>
> /usr/bin/checkpolicy: loading policy configuration from policy.conf
> security: 5 users, 6 roles, 1323 types, 31 bools
> security: 53 classes, 313479 rules
> assertion on line 269956 violated by allow kudzu_t
> memory_device_t:chr_file { read write };
"head -269956 policy.conf |tail -1" gives the following:
neverallow { domain -privmem } memory_device_t:{ chr_file blk_file } { read
write append };
The solution is to add the privmem attribute to the declaration of kudzu_t:
daemon_base_domain(kudzu, `, etc_writer, privmodule, sysctl_kernel_writer,
fs_domain, privmem')
--
http://www.coker.com.au/selinux/ My NSA Security Enhanced Linux packages
http://www.coker.com.au/bonnie++/ Bonnie++ hard drive benchmark
http://www.coker.com.au/postal/ Postal SMTP/POP benchmark
http://www.coker.com.au/~russell/ My home page
More information about the fedora-selinux-list
mailing list