Re: libgpod HAL callout and SELinux denials

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I wrote:
> Daniel J Walsh wrote:
>> And I will add rules to allow this in F10 and F11.

The selinux-policy-3.5.13-38.fc10 fixed things nicely (noted in bodhi
as well).

>> Are you planning on putting this in F9?

The rules aren't in the selinux-policy-3.3.1-117.fc9 that's in
updates-testing yet, right?

While I'm looking at these iPod callouts, I noticed that there's some
podsleuth policy to allow podsleuth to do similar things.  Should we
coordinate things so that podsleuth and libgpod can share some
selinux-policy?

I do find that the podsleuth hal callout still produces AVC denials on
F-10 (every time an iPod is inserted):

type=AVC msg=audit(1231370741.744:256): avc:  denied  { execstack } for  pid=1521 comm="mono" scontext=system_u:system_r:podsleuth_t:s0 tcontext=system_u:system_r:podsleuth_t:s0 tclass=process
type=SYSCALL msg=audit(1231370741.744:256): arch=40000003 syscall=125 success=yes exit=0 a0=bfd5f000 a1=1000 a2=1000007 a3=fffff000 items=0 ppid=1518 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="mono" exe="/usr/bin/mono" subj=system_u:system_r:podsleuth_t:s0 key=(null)

Is this a generic mono execstack problem or is it something that needs
to be fixed in podsleuth or selinux-policy?

-- 
Todd        OpenPGP -> KeyID: 0xBEAF0CE3 | URL: www.pobox.com/~tmz/pgp
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
It is easier to fight for one's principles than to live up to them.
    -- Alfred Adler

Attachment: pgpifS3aeyO7y.pgp
Description: PGP signature

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux