Debian testing +selinux
sds at tycho.nsa.gov
Tue Jul 24 12:11:30 UTC 2007
On Tue, 2007-07-24 at 10:17 +0800, Ken YANG wrote:
> Stephen Smalley wrote:
> > On Mon, 2007-07-23 at 09:41 -0500, Justin Conover wrote:
> >> Another question, does doing this audit2allow method sort of mean "I
> >> have no idea what I'm doing, so allow it all", or is that why it
> >> caught the hald_t memory portion and said NO, don't do this!
> > As per the audit2allow man page, you should think through the rules
> > generated by audit2allow, not just blindly take them.
> > The neverallow statements aka assertions in the base policy will catch
> > certain kinds of dangerous access or malformed rules, but are certainly
> > not exhaustive.
> with your words, can i think the violated assertion, such as:
> assertion on line 0 violated by allow ......
> only be introduced by "neverallow" rules? Are there any other rules
> will cause this kind of errors?
Only neverallow rules cause those messages to occur. The "assertion on
line 0" part is a holdover of when this was all done when policy was
compiled from source (versus precompiled loadable modules).
National Security Agency
More information about the fedora-selinux-list