Re: rawhide selinux-policy-strict whoopsage...

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 01 Feb 2006 14:39:37 EST, Stephen Smalley said:

> Looks like the .spec file needs to install all of the modules as a
> single transaction to deal with mutually dependent modules.  Or, it
> could install them layer-by-layer.  Unfortunately, current semodule
> usage requires you to generate the list of all the modules, then prefix
> them all with -i options, then pass that entire string as the
> commandline to semodule.  Something like:
> 	# Location where modules are installed from policy package
> 	cd /usr/share/selinux/strict
> 	# Generate semodule command line with all non-base modules
> 	ls *.pp | sed -e "/base.pp/d" -e "/enableaudit.pp/d" -e "i-i " | tr "\n
" " " > out
> 	# Run semodule
> 	semodule -v `cat out`

I did this after yum updated me to selinux-policy-strict-2.2.9-1 this morning,
and things are much less broken now.  Now we have:

Attempting to install module 'acct.pp':
Ok: return value of 0.
Attempting to install module 'alsa.pp':
Ok: return value of 0.
Attempting to install module 'amanda.pp':
Ok: return value of 0.
...
Attempting to install module 'xserver.pp':
Ok: return value of 0.
Attempting to install module 'zebra.pp':
Ok: return value of 0.
Committing changes:
libsepol.check_assertion_helper: assertion on line 0 violated by allow pam_console_t scsi_generic_device_t:chr_file { setattr };
libsepol.check_assertion_helper: assertion on line 0 violated by allow initrc_t scsi_generic_device_t:chr_file { setattr };
libsepol.check_assertion_helper: assertion on line 0 violated by allow restorecon_t scsi_generic_device_t:chr_file { relabelto };
libsepol.check_assertion_helper: assertion on line 0 violated by allow setfiles_t scsi_generic_device_t:chr_file { relabelto };
libsepol.check_assertion_helper: assertion on line 0 violated by allow restorecon_t lvm_vg_t:chr_file { relabelto };
libsepol.check_assertion_helper: assertion on line 0 violated by allow setfiles_t lvm_vg_t:chr_file { relabelto };
libsepol.check_assertion_helper: assertion on line 0 violated by allow pam_console_t fixed_disk_device_t:blk_file { setattr };
libsepol.check_assertion_helper: assertion on line 0 violated by allow hotplug_t fixed_disk_device_t:blk_file { setattr };
libsepol.check_assertion_helper: assertion on line 0 violated by allow restorecon_t fixed_disk_device_t:chr_file { relabelto };
libsepol.check_assertion_helper: assertion on line 0 violated by allow setfiles_t fixed_disk_device_t:chr_file { relabelto };
libsepol.check_assertion_helper: assertion on line 0 violated by allow initrc_t shadow_t:file { getattr };
libsepol.check_assertion_helper: assertion on line 0 violated by allow locate_t shadow_t:file { getattr };
libsepol.check_assertion_helper: assertion on line 0 violated by allow sysadm_t shadow_t:file { getattr };
libsepol.check_assertion_helper: assertion on line 0 violated by allow prelink_t shadow_t:file { getattr };
libsepol.check_assertion_helper: assertion on line 0 violated by allow nscd_t shadow_t:file { getattr };
libsepol.check_assertion_helper: assertion on line 0 violated by allow system_crond_t shadow_t:file { getattr };
libsepol.check_assertion_helper: assertion on line 0 violated by allow restorecon_t shadow_t:file { getattr relabelto };
libsepol.check_assertion_helper: assertion on line 0 violated by allow setfiles_t shadow_t:file { getattr relabelto };
libsepol.check_assertions: 18 assertion violations occured
libsemanage.semanage_expand_sandbox: Expand module failed
semodule:  Failed!

18 assertions.  This looks fixable....

Attachment: pgp6XTEcjg3ak.pgp
Description: PGP signature

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux