On 10/25/2013 01:53 PM, Dominick Grift wrote:
On Fri, 2013-10-18 at 14:20 -0400, James Carter wrote:
I pushed an update of CIL to bitbucket.
Is it me or is the negator "not" not working here:
(boolean secure_mode_insmod false)
(booleanif (not secure_mode_insmod)
(true
(allow loadkernelmodule self (capability (sys_module sys_nice)))
(allow loadkernelmodule kernel_t (process (setsched)))))
(macro kernel_load_module ((type ARG1))
(typeattributeset loadkernelmodule ARG1))
(call kernel_load_module (kernel_t))
# getsebool -a | grep insmod
secure_mode_insmod --> off
# sesearch -ASCT -p sys_module | grep insmod
ET allow kernel_t kernel_t : capability { sys_module sys_nice } ; [ secure_mode_insmod ! ]
This looks correct and the branch is enabled. I don't know why it is not
working. I will take a look.
# ausearch -m user_avc,avc,selinux_err -ts 19:35 -i | grep sys_module | audit2why
type=AVC msg=audit(10/25/2013 19:35:43.392:140) : avc: denied { sys_module } for pid=494 comm=modprobe capability=sys_module scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability
Was caused by:
The boolean secure_mode_policyload was set incorrectly.
Description:
Allow secure to mode policyload
Allow access by executing:
# setsebool -P secure_mode_policyload 1
--
James Carter <jwcart2@xxxxxxxxxxxxx>
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.