Jim Perrin wrote:
With CentOS 5, you don't really need the selinux module source
anymore. It's usually enough to clear the logs and in permissive mode,
run the offending application. Then 'grep yourapp
/var/log/audit/audit.log | audit2allow -M localmodname'. Check the
module for sanity and make
On Mon, May 5, 2008 at 12:42 PM, Ingemar Nilsson <[EMAIL PROTECTED]> wrote:
> Lots of questions, but the documentation on this subject isn't exactly
> stellar. :)
With CentOS 5, you don't really need the selinux module source
anymore. It's usually enough to clear the logs and in permissive mode
Hi.
I'm trying to figure out where the SELinux policy modules shipped with
the system live, and how they work. The modules listed by 'semodule -l'
are the same as those available in
/etc/selinux/targeted/modules/active/modules, but those are not part of
any package, and are presumably added a
3 matches
Mail list logo