| Summary: | BR audit2allow support | ||
|---|---|---|---|
| Product: | buildroot | Reporter: | Tomas V Arredondo <surf_fanatico> |
| Component: | Other | Assignee: | unassigned |
| Status: | RESOLVED FIXED | ||
| Severity: | major | CC: | buildroot |
| Priority: | P2 | ||
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Host: | Target: | ||
| Build: | |||
|
Description
Tomas V Arredondo
2020-07-21 12:42:15 UTC
This essentially blocks new policy creation as auditwallow is critical to selinux. (In reply to Tomas V Arredondo from comment #1) (typo it should be audit2allow not auditwallow) Solved as of 5.4.53 audit2allow < /var/log/messages #============= kernel_t ============== #!!!! This avc can be allowed using one of the these booleans: allow_execstack, allow_execmem allow kernel_t self:process execmem; uname -r 5.4.53 |