James Carter wrote:
On Fri, 2008-03-07 at 14:13 -0500, Christopher J. PeBenito wrote:
On Thu, 2008-03-06 at 16:11 -0500, James Carter wrote:
Upstart spawns a shell during boot and, without this patch, it will
transition to the sysadm_t domain, but remain in the system_r role.
Services started by that shell will fail to start, even in permissive
mode, if system_u:system_r:sysadm_someservice_t is an invalid context.
We really don't want to be starting services from the sysadm_t domain
during boot.
In case the severity of this problem isn't clear:
Rawhide + refpolicy trunk + enforcing mode = lockup at boot:
<permission denials from system_u:system_r:sysadm_t accessing tmpfs>
init: rc-default main program terminated with status 1
Rawhide + refpolicy trunk + permissive mode = dbus "permission denials"
resulting from invalid contexts:
Mar 5 15:48:11 moss-charon kernel: security: context
system_u:system_r:sysadm_dbusd_t:s0 is invalid
Mar 5 15:48:11 moss-charon avahi-daemon[2158]: dbus_bus_get_private():
An SELinux policy prevents this sender from sending this message to this
recipient (rejected message had interface "org.freedesktop.DBus" member
"Hello" error name "(unset)" destination "org.freedesktop.DBus")
Mar 5 15:48:11 moss-charon avahi-daemon[2158]: WARNING: Failed to
contact D-Bus daemon.
--
Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.