Kernel 2.6.14-1.1653 & selinux 1.27.1.-2.16

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I have been desperately trying to get selinux strict policy to work on my
laptop to no avail. I have been using a strict policy in enforcing mode for a
long time, but since I upgraded to the kernel / selinux versions listed below,
when in enforcing mode, the policy causes authentication to fail from the
console (my default runlevel is 3).

Even though I have the following statements in my custom.te under
/etc/selinux/strict/src/policy/domains/misc/

allow kernel_t sysadm_t:process transition;
allow kernel_t sysadm_tty_device_t:chr_file { relabelfrom relabelto };
allow sysadm_t sysadm_t:process transition;

I keep getting corresponding 'avc: denied' events in the audit log.

Kernel auditing is enabled at boot time (audit=1 kernel switch) and the audit
daemon is set to run at boot time.

I am using:
kernel-2.6.14-1.1653_FC4
selinux-policy-strict-sources-1.27.1-2.16

How can I go about fixing this issue?


--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux