Bug 222548

Summary: Corrupt evolution.if in selinux-policy-devel-2.4.6-23.fc6.noarch.rpm
Product: [Fedora] Fedora Reporter: Ted Rule <ejtr>
Component: selinux-policyAssignee: Daniel Walsh <dwalsh>
Status: CLOSED CURRENTRELEASE QA Contact: Ben Levenson <benl>
Severity: medium Docs Contact:
Priority: medium    
Version: 6CC: dwalsh, kmacmill, moneta.mace, ramsdell
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Current Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-08-22 14:13:17 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 222805    

Description Ted Rule 2007-01-13 22:33:07 UTC
Description of problem:

The recently released devel rpm, selinux-policy-devel-2.4.6-23.fc6.noarch.rpm,
appears to contain an odd 'corruption' in the evolution.if file, viz:

/usr/share/selinux/devel/include/apps/evolution.if

The end of the interface file contains this set of allow statements: 

allow staff_evolution_alarm_t staff_t:fifo_file { getattr write };
allow staff_evolution_alarm_t staff_t:unix_stream_socket connectto;
allow staff_evolution_alarm_t staff_tmp_t:dir { add_name getattr search setattr
write };
allow staff_evolution_alarm_t staff_tmp_t:file { getattr lock read write };
allow staff_evolution_alarm_t staff_tmp_t:sock_file { create write };
allow staff_evolution_alarm_t tmp_t:dir read;

allow staff_evolution_exchange_t staff_t:fd use;
allow staff_evolution_exchange_t staff_t:fifo_file { getattr write };
allow staff_evolution_exchange_t staff_tmp_t:dir { add_name getattr search
setattr write };
allow staff_evolution_exchange_t staff_tmp_t:file { getattr lock read write };
allow staff_evolution_exchange_t staff_tmp_t:sock_file { create write };

allow staff_evolution_server_t staff_t:fifo_file { getattr write };
allow staff_evolution_server_t staff_t:unix_stream_socket connectto;
allow staff_evolution_server_t staff_tmp_t:dir { add_name getattr search setattr
write };
allow staff_evolution_server_t staff_tmp_t:file { getattr lock read write };
allow staff_evolution_server_t staff_tmp_t:sock_file { create write };
allow staff_evolution_server_t tmp_t:dir { getattr read search };

allow staff_evolution_t default_t:lnk_file read;


I had previously downloaded the .23 rpm from the testing area,
but I only noticed this today whilst I was trying to build a module
to rebuild my anacron module tweak against the .23 policy,
and got this error message:

[root selinux.local]# make localanacron.pp
Compiling strict localanacron module
/usr/bin/checkmodule:  loading policy configuration from tmp/localanacron.tmp
tmp/all_interfaces.conf:7820:ERROR 'syntax error' at token 'allow' on line 3871:

allow staff_evolution_alarm_t staff_t:fifo_file { getattr write };
/usr/bin/checkmodule:  error(s) encountered while parsing configuration
make: *** [tmp/localanacron.mod] Error 1
[root@topaz selinux.local]#

[root ~]#


The error message corresponds to the first rogue line in the interface file;
once I'd commented out all the lines, my new module compiled Ok.
I checked for any other rogue 'allow' lines in the other interface definitions,
but this appears to be the only set of oddities.

I made a cursory check elsewhere, and the 2.4.6-21.fc7 policy-devel
appears to have the same corruption, whilst the 2.4.6-17.fc6 doesn't.


Version-Release number of selected component (if applicable):

selinux-policy-devel-2.4.6-23.fc6.noarch.rpm


How reproducible:

Attempting to build a new selinux module using 
/usr/share/selinux/devel/Makefile using .te .fc files aborts during
compilation.


Steps to Reproduce:
1.
2.
3.
  
Actual results:


Expected results:


Additional info:

Comment 3 Daniel Walsh 2007-01-15 15:04:57 UTC
Fixed in selinux-policy-devel-2.4.6-27

Comment 4 Daniel Walsh 2007-01-15 15:52:06 UTC
*** Bug 222544 has been marked as a duplicate of this bug. ***

Comment 5 Karl MacMillan 2007-01-15 16:57:45 UTC
*** Bug 222671 has been marked as a duplicate of this bug. ***

Comment 6 Daniel Walsh 2007-08-22 14:13:17 UTC
Fixed in current release