Re: SELinux policy for fsetfilecon() in libselinux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 04/08/2009 09:11 PM, Brian Ginn wrote:
I am attempting to use the fsetfilecon() call within a C program.  Several other libselinux calls are working OK, but this call fails in enforcing mode (it works in permissive mode).



The audit.log and audit2allow are suggesting policy code that I already have in the policy.

I suspect that I'm being bitten by a "don't audit" rule somewhere.



Is there a reference policy macro that I can include to get fsetfilecon() to work?



Note: I already included

       selinux_get_enforce_mode( t_selinux_api_t );

To get the security_getenforce() function to work.





Thanks,

Brian





------------------------------------------------------------------------

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

You are most likely hitting a constraint.


If you run your avc messages through audit2why, you will probably see it is a constraint.

If you are changing the user componant of a file you need to
domain_obj_id_change_exemption()


########################################
## <summary>
##	Makes caller an exception to the constraint preventing
##	changing the user identity in object contexts.
## </summary>
## <param name="domain">
##	<summary>
##	The process type to make an exception to the constraint.
##	</summary>
## </param>
## <rolecap/>
#
interface(`domain_obj_id_change_exemption',`
	gen_require(`
		attribute can_change_object_identity;
	')

	typeattribute $1 can_change_object_identity;
')

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux