Re: RHEL5 initrc_t vs. unconfined_t

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, May 14, 2008 at 09:39:52AM -0400, Daniel J Walsh wrote:
> The problem is exactly the opposite of what you are asking.
> unconfined_t transitions to very few domains currently while initrc_t
> transitions to many.  unconfined_t is a logged in user domain.  So I
> would not run init scripts as unconfined_t.

Please, please, pretty please, may I be allowed to run a critical filesystem
and high availability solution unconfined until the vendors of these implement
and certify them for selinux? ;-)

> The better answer is to fix the avc's that you are seeing when trying to
> run ifconfig from initrc.  What avc's are you seeing?

I haven't tried running in permissive, so there will likely be more than
these, but that's what I've got right now:

type=AVC msg=audit(1210760976.747:24): avc:  denied  { read write } for pid=4739 comm="ifconfig" path="socket:[17163]" dev=sockfs ino=17163 scontext=user_u:system_r:ifconfig_t:s0 tcontext=user_u:system_r:initrc_t:s0 tclass=unix_stream_socket
type=AVC msg=audit(1210758692.381:10): avc:  denied  { read } for pid=4137 comm="mount" path="eventpoll:[17363]" dev=eventpollfs ino=17363 scontext=system_u:system_r:mount_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=file
type=AVC msg=audit(1210758684.281:6): avc:  denied  { append } for pid=3763 comm="umount" path="/var/adm/ras/mmfs.log.2008.05.14.11.51.24.lagring2" dev=dm-2 ino=720912 scontext=system_u:system_r:mount_t:s0 tcontext=system_u:object_r:var_t:s0 tclass=file
type=AVC msg=audit(1210758692.378:9): avc:  denied  { relabelfrom } for pid=4136 comm="mount" scontext=system_u:system_r:mount_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem
type=AVC msg=audit(1210758692.381:10): avc:  denied  { read } for  pid=4137 comm="mount" path="eventpoll:[17360]" dev=eventpollfs ino=17360 scontext=system_u:system_r:mount_t:s0 tcontext=system_u:system_r:initrc_t:s0 tclass=file



  -jf

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux