SOLVED: Allow rule not having any effect?!

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Ran the AVC through audit2allow, just to see if it would give me any
clues, and sure enough, it actually did.  The problem was that the
SELinux users didn't match, i.e. system_u != unconfined_u.

Ironically, I actually hit this exact same problem 8 years ago.

https://selinux.tycho.nsa.narkive.com/lPRcuGbE/cannot-write-policy-to-allow-relabelto

On 11/11/24 11:30 AM, Ian Pilcher wrote:
I'm either missing something incredibly obvious, or something really,
really weird is going on.

I have a policy module that includes this rule.

   allow runcp_t etc_t:file { create write setattr };

And I can see that the rule is loaded.

   $ sesearch --allow -s runcp_t -t etc_t -c file -ds -dt
   allow runcp_t etc_t:file { create setattr write };

Nonetheless, I am still getting this denial.

   type=AVC msg=audit(1731345803.780:3765): avc:  denied  { create } for
   pid=289668 comm="cp" name="config"
   scontext=system_u:system_r:runcp_t:s0
   tcontext=unconfined_u:object_r:etc_t:s0 tclass=file permissive=0

AFAICT, this makes no sense at all.

Any ideas?

--
========================================================================
If your user interface is intuitive in retrospect ... it isn't intuitive
========================================================================




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux