On Mar 7, 2008, at 7:52 AM, Daniel J Walsh wrote:
Looks like it. I think leaving making it initrc_t would fix most of
your avc messages.
It certainly changed them. Here is the of the changing init_t to
initrc_t
#============= init_t ==============
allow init_t self:unix_dgram_socket sendto;
allow init_t shell_exec_t:file { read execute execute_no_trans };
#============= initrc_t ==============
allow initrc_t lvm_control_t:chr_file write;
#============= insmod_t ==============
allow insmod_t kernel_t:process setsched;
#============= sysadm_t ==============
allow sysadm_t cpu_device_t:chr_file write;
allow sysadm_t self:udp_socket listen;
allow sysadm_t var_log_t:file append;
and the denials
[root@rawhide ~]# grep denied /var/log/messages
Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925519.436:3):
avc: denied { execute } for pid=502 comm="init" name="bash"
dev=sda2 ino=24084497 scontext=system_u:system_r:init_t:s0-
s15:c0.c1023 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file
Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925519.437:4):
avc: denied { read } for pid=502 comm="init" name="bash" dev=sda2
ino=24084497 scontext=system_u:system_r:init_t:s0-s15:c0.c1023
tcontext=system_u:object_r:shell_exec_t:s0 tclass=file
Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925519.437:5):
avc: denied { execute_no_trans } for pid=502 comm="init" path="/bin/
bash" dev=sda2 ino=24084497 scontext=system_u:system_r:init_t:s0-
s15:c0.c1023 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file
Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925522.258:6):
avc: denied { setsched } for pid=616 comm="modprobe"
scontext=system_u:system_r:insmod_t:s0-s15:c0.c1023
tcontext=system_u:system_r:kernel_t:s15:c0.c1023 tclass=process
Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925527.696:7):
avc: denied { write } for pid=1307 comm="multipath.stati"
name="control" dev=tmpfs ino=5337
scontext=system_u:system_r:initrc_t:s0-s15:c0.c1023
tcontext=system_u:object_r:lvm_control_t:s0 tclass=chr_file
Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925529.532:8):
avc: denied { execute } for pid=1445 comm="init" name="bash"
dev=sda2 ino=24084497 scontext=system_u:system_r:init_t:s0-
s15:c0.c1023 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file
Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925529.532:9):
avc: denied { read } for pid=1445 comm="init" name="bash" dev=sda2
ino=24084497 scontext=system_u:system_r:init_t:s0-s15:c0.c1023
tcontext=system_u:object_r:shell_exec_t:s0 tclass=file
Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925529.532:10):
avc: denied { execute_no_trans } for pid=1445 comm="init" path="/
bin/bash" dev=sda2 ino=24084497 scontext=system_u:system_r:init_t:s0-
s15:c0.c1023 tcontext=system_u:object_r:shell_exec_t:s0 tclass=file
Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925529.612:11):
avc: denied { sendto } for pid=1445 comm="telinit"
path=002F636F6D2F7562756E74752F75707374617274
scontext=system_u:system_r:init_t:s0-s15:c0.c1023
tcontext=system_u:system_r:init_t:s0-s15:c0.c1023
tclass=unix_dgram_socket
Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925529.798:12):
avc: denied { setsched } for pid=1474 comm="modprobe"
scontext=system_u:system_r:insmod_t:s0-s15:c0.c1023
tcontext=system_u:system_r:kernel_t:s15:c0.c1023 tclass=process
Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925529.975:13):
avc: denied { write } for pid=1491 comm="microcode_ctl"
name="microcode" dev=tmpfs ino=5796
scontext=system_u:system_r:sysadm_t:s0-s15:c0.c1023
tcontext=system_u:object_r:cpu_device_t:s0 tclass=chr_file
Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925540.061:16):
avc: denied { listen } for pid=2051 comm="rpcbind" lport=955
scontext=system_u:system_r:sysadm_t:s0-s15:c0.c1023
tcontext=system_u:system_r:sysadm_t:s0-s15:c0.c1023 tclass=udp_socket
Mar 7 15:32:21 rawhide kernel: type=1400 audit(1204925541.097:17):
avc: denied { append } for pid=2152 comm="rsyslogd" name="secure"
dev=sda2 ino=2621494 scontext=system_u:system_r:sysadm_t:s0-
s15:c0.c1023 tcontext=system_u:object_r:var_log_t:s15:c0.c1023
tclass=file
joe
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.