Re: Many 'map' SELinux denials in current Rawhide

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 08/15/2017 02:50 PM, Joonas Sarajärvi wrote:
Adam Williamson kirjoitti 15.08.2017 klo 02:37:
Of course, for day-to-day Rawhide users, booting with 'enforcing=0' can
work around these issues for now (or you could, I suppose, create a
local policy that just blanket allowed the 'map' permission in all
cases, so all other SELinux restrictions would remain in place).

For those less familiar with SELinux but still using it and wishing to keep things that way, it would be awesome to have a quick summary (or just pointer to documentation) on how you do this. It sounds like a fairly straightforward task to describe if you know your way around SELinux.

Thanks,
- Joonas
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx

This would be fairly difficult. Basically the kernel added a new access check map to verify memory mapped file systems are still accessible by the process after a policy load. The map access had to be added to all file access interfaces. Basically lots of rules are written

read_files_pattern(SOURCE_T, TARGET_T)

But read_files_pattern had to have an additional map access added and then all of the domains get the access.


_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux