Re: Questions about the following denials

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2012-07-30 at 13:11 -0700, Haiqing Jiang wrote:
> Hi, Stephen,
> 
> 
> Could you give me some suggestions for the understanding the denials
> as shown below?
> 
> 
> #============= release_app ==============
> allow release_app zygote:netlink_selinux_socket getattr;
> 
> <5>[13011.539764] type=1400 audit(1343515886.695:592): avc:  denied
> { getattr } for  pid=10278 comm="ationTestRunner" path="socket:[1516]"
> dev=sockfs ino=1516 scontext=u:r:release_app:s0 tcontext=u:r:zygote:s0
> tclass=netlink_selinux_socket

Just dontaudit it.  No need for the app to be able to use a
NETLINK_SELINUX socket.

> #============= untrusted_app ==============
> allow untrusted_app self:netlink_route_socket create;
> 
> <5>[13900.251708] type=1400 audit(1343516775.406:801): avc:  denied
>  { create } for  pid=15089 comm="WebViewCoreThre"
> scontext=u:r:untrusted_app:s0:c39 tcontext=u:r:untrusted_app:s0:c39
> tclass=netlink_route_socket

Might be required for some apps; should be added under app_network
boolean, as:
# Get route information.
allow untrusted_app self:netlink_route_socket { create bind read
nlmsg_read };


-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux