On 10/10/2016 05:02 PM, Jeffrey Vander Stoep wrote: > When loading a kernel module using init_module the module is copied > from memory of the calling process. In that case, the target really is > the calling process. When using finit_module a file is passed to the > kernel and that file is the target object. > > See the commit message that added module_load for a more complete > description: https://marc.info/?l=selinux&m=145988689809307&w=2 > Thanks, Sorry about that. > On Sun, Oct 9, 2016 at 1:10 AM, Dominick Grift <dac.override@xxxxxxxxx> wrote: >> >> I encountered a system module_load event for the first time today. >> Howver i am a bit surprised: >> >> >> avc: denied { module_load } for pid=473 comm="modprobe" >> scontext=wheel.id:sysadm.role:lmc.subj:s0-s0:c0.c1023 >> tcontext=wheel.id:sysadm.role:lmc.subj:s0-s0:c0.c1023 tclass=system >> permissive=1 >> >> Should that permission not have applied to a kernel module object >> instead of "self"? >> -- >> Key fingerprint = 5F4D 3CDB D3F8 3652 FBD8 02D5 3B6C 5F1D 2C7B 6B02 >> https://sks-keyservers.net/pks/lookup?op=get&search=0x3B6C5F1D2C7B6B02 >> Dominick Grift >> >> >> _______________________________________________ >> Selinux mailing list >> Selinux@xxxxxxxxxxxxx >> To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. >> To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx. -- Key fingerprint = 5F4D 3CDB D3F8 3652 FBD8 02D5 3B6C 5F1D 2C7B 6B02 https://sks-keyservers.net/pks/lookup?op=get&search=0x3B6C5F1D2C7B6B02 Dominick Grift
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.