On Thursday 06 August 2009 05:17:36 pm LC Bruzenak wrote:
 So it appears that the "never" rule is not firing...right?
No, its actually something else
 I'm not sure if the rule applies to only the info in the
"type=syscall"
 line. Really I want to compare against the specific scontext/tcontext
 pair in the "type=AVC" line. 
The issue is that SE Linux AVCs travel a different path. When an AVC denial 
occurs and there is not a dontaudit associated with it, it sends the event 
straight to the netlink queue. To suppress an AVC, you would need to make a 
change to SE Linux policy. The SE Linux folks wanted to make sure there was no 
way to suppress an AVC without explicitly stating so in policy.
-Steve