Re: Yet another strange behavior.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 04/23/2015 09:00 AM, Stephen Smalley wrote:
> On 04/23/2015 08:57 AM, Minear, Spencer wrote:
>> Running in permissive mode during development so the actual operation is not being blocked.  An example of the audit is as follows
>>
>> [    5.075061] audit: type=1400 audit(1429635963.920:3): avc:  denied  { create } for  pid=2494 comm="sed" name="sedxhSZOp" scontext=system_u:system_r:sg_cfg_t:s0 tcontext=unconfined_u:object_r:etc_t:s0 tclass=file permissive=1
>>
>> Running sesearch on the policy file, shows the following:
>>
>> Found 1 semantic av rules:
>>    allow sg_cfg_t etc_t : file { ioctl read write create getattr setattr relabelfrom relabelto append unlink rename open } ;
> 
> The user identities are not equal, so in a typical policy, this will
> violate a constraint on file create permission.  audit2why tells which
> part of policy is denying the action, although the level of detail will
> vary depending on your policy version and how recent your selinux
> userspace is.

BTW, normally the user field of the context for a new file is inherited
from its creator, so normally the tcontext= would be
system_u:object_r:etc_t:s0, not unconfined_u:object_r:etc_t:s0.  The
fact that it is unconfined_u suggests that either the userspace program
is explicitly specifying the context (e.g. to match the original file)
or that your policy specifies a default_user rule that defaults to
inheriting from the parent directory instead,
http://selinuxproject.org/page/DefaultRules#default_user


_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux