On Sun, 2005-05-22 at 21:53 -0400, Valdis.Kletnieks@xxxxxx wrote: > On Sun, 22 May 2005 21:42:17 EDT, "James Z. Li" said: > > targeted policy on FC3 > > > > /var/log/messages show lots of avcs: > > May 22 20:54:42 bengal kernel: audit(1116809682.160:0): avc: denied > > { getattr } for pid=2733 exe=/bin/ps path=/proc/1 dev=proc ino=65538 > > scontext=user_u:system_r:httpd_sys_script_t > > tcontext=user_u:system_r:unconfined_t tclass=dir > > Am I the only one here who thinks that this is really something that can't > be supported in the context of the 'targeted' policy, and would be much > easier to do in 'strict'? It shouldn't be done at all, other than to dontaudit these attempts. No legitimate reason for a CGI script to be probing init's /proc/pid files. -- Stephen Smalley National Security Agency -- fedora-selinux-list mailing list fedora-selinux-list@xxxxxxxxxx http://www.redhat.com/mailman/listinfo/fedora-selinux-list