Re: Update to CIL

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 10/25/2013 01:53 PM, Dominick Grift wrote:
On Fri, 2013-10-18 at 14:20 -0400, James Carter wrote:
I pushed an update of CIL to bitbucket.

Is it me or is the negator "not" not working here:

(boolean secure_mode_insmod false)

(booleanif (not secure_mode_insmod)
   (true
     (allow loadkernelmodule self (capability (sys_module sys_nice)))
     (allow loadkernelmodule kernel_t (process (setsched)))))



(macro kernel_load_module ((type ARG1))
   (typeattributeset loadkernelmodule ARG1))

(call kernel_load_module (kernel_t))

# getsebool -a | grep insmod
secure_mode_insmod --> off


# sesearch -ASCT -p sys_module | grep insmod
ET allow kernel_t kernel_t : capability { sys_module sys_nice } ; [ secure_mode_insmod ! ]


This looks correct and the branch is enabled. I don't know why it is not working. I will take a look.

# ausearch -m user_avc,avc,selinux_err -ts 19:35 -i | grep sys_module | audit2why
type=AVC msg=audit(10/25/2013 19:35:43.392:140) : avc:  denied  { sys_module } for  pid=494 comm=modprobe capability=sys_module  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability

         Was caused by:
         The boolean secure_mode_policyload was set incorrectly.
         Description:
         Allow secure to mode policyload

         Allow access by executing:
         # setsebool -P secure_mode_policyload 1




--
James Carter <jwcart2@xxxxxxxxxxxxx>
National Security Agency

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux