Security Enhanced Linux
What's New
Frequently Asked Questions
Background
Documents
License
Download
Participating
Mail List
Archives
Remaining Work
Contributors
Related Work
Press Releases
Information Assurance Research
NIARL In-house Research Areas
Mathematical Sciences Program
Sabbaticals
Computer & Information Sciences Research
Technology Transfer
Advanced Computing
Advanced Mathematics
Communications & Networking
Information Processing
Microelectronics
Other Technologies
Technology Fact Sheets
Publications
Related Links
|
SELinux Mailing ListRe: temporary hack to use udev in selinux
From: Luke Kenneth Casson Leighton <lkcl_at_lkcl.net>
Date: Thu, 29 Jul 2004 03:04:31 +0100
if anyone would like to play with this (aside from kicking the udev developer) then you can find the code at http://hands.com/~lkcl/selinux/2.6.6. it's too late in the morning to go making patches, sorry: help yourself. i'll sort patches later. i added, like chris did, some "special" inodes stuff, and some stuff to do symlinks too. of course, the default policy files all expect the root filesystem to be a hard drive not a tmpfs_t so boot poos up. i started adding in selinux permissions to udev.te. ... i get the impression that i need to do stuff like create a new initrd that has /selinux in it and things. but what i _can_ do that's fairly easy is write a message to the nice udev developer :) l.
On Thu, Jul 29, 2004 at 02:35:10AM +0100, Luke Kenneth Casson Leighton wrote:
> > Chris PeBenito made this patch for Gentoo when we were evalutating udev -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.Received on Wed 28 Jul 2004 - 21:53:33 EDT |
|
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009 |