Research
.
Skip Search Box

SELinux Mailing List

Re: SE-Linux packages

From: Stephen Smalley <sds_at_tislabs.com>
Date: Tue, 1 Oct 2002 07:40:03 -0400 (EDT)

On Tue, 1 Oct 2002, Tom wrote:

> Is it possible that the selinux-policy-default is broken? I've done
> everything I could to make sure I have a clean build (including rm -rf
> /etc/selinux) and I still get several hundred errors on install or
> make. Here are some:
>
> ERROR 'permission access is not defined for class chr_file' at token ';' on line 4043:
> allow sysadm_su_t null_device_t:chr_file { ioctl read getattr access lock poll write append };

I posted a patch on 9/24 (signull-obsolete) that removed obsolete permissions from the access vector definitions. See http://marc.theaimsgroup.com/?l=selinux&m=103289918201533&w=2. It looks like you are trying to compile a policy that still has those obsolete permissions against the new access_vectors definitions, which naturally won't work so well.

--
Stephen D. Smalley, NAI Labs
ssmalley@nai.com




--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
Received on Tue 1 Oct 2002 - 07:52:04 EDT
 

Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009

 
bottom

National Security Agency / Central Security Service