Re: [FC3] kernel panic after selinux-policy-targeted update

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2005-06-28 at 22:27 +1000, Russell Coker wrote:
> > Jun 28 18:56:00 ben8600 kernel: audit(1119948960.209:0): avc:  denied
> > { execmod } for  pid=13420 comm=mingetty path=/lib/tls/libc-2.3.5.so
> > dev=hda11 ino=20455 scontext=user_u:system_r:unconfined_t
> > tcontext=system_u:object_r:lib_t tclass=file
> 
> That's an example of a .so file which is mis-labeled.

Not necessarily.  Prior to -3.13, shlib_t was a typealias for lib_t in
the targeted policy, so it would be normal for audit messages to display
lib_t here for a .so.  Real question is why is an execmod check being
triggered on /lib/tls/libc-2.3.5.so, as it should only occur on attempts
to make executable a previously modified private file mapping, typically
text relocation.

-- 
Stephen Smalley
National Security Agency


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux