* Reloading policy fills audit log with "selinux_audit_rule_match: stale rule"
@ 2012-12-30 9:51 Sven Vermeulen
2012-12-31 23:50 ` Sven Vermeulen
0 siblings, 1 reply; 2+ messages in thread
From: Sven Vermeulen @ 2012-12-30 9:51 UTC (permalink / raw)
To: selinux
Hi guys,
When I reload the SELinux policy on my system (semodule -R) or rebuild
and reload (semodule -B), for every action I do it generates a dozen or so
errors like the following:
#v+
Dec 30 10:25:24 test kernel: [ 181.999527] type=1403 audit(1356859524.575:133): policy loaded auid=0 ses=1
Dec 30 10:25:26 test kernel: [ 184.148180] type=1401 audit(1356859526.724:134): selinux_audit_rule_match: stale rule
Dec 30 10:25:26 test kernel: [ 184.148180]
Dec 30 10:25:26 test kernel: [ 184.148187] type=1401 audit(1356859526.724:135): selinux_audit_rule_match: stale rule
Dec 30 10:25:26 test kernel: [ 184.148187]
Dec 30 10:25:26 test kernel: [ 184.148191] type=1401 audit(1356859526.724:136): selinux_audit_rule_match: stale rule
Dec 30 10:25:26 test kernel: [ 184.148191]
#v-
I am completely lost as to what this is about. Perhaps the audit subsystem
not realising that the SELinux policies have been reloaded? Is there a way
to reload the SELinux audit rules that I don't know about? I've grepped the
kernel sources for audit_rule_init but didn't find anything useful.
I did not have this with 3.6.* kernels (this is on a 3.7 kernel). One
change between the 3.6 and 3.7 kernels that I have is that I enabled
IMA/EVM, but I have the problem even when I disable IMA appraisal
(ima_appraise=off ima_audit=0).
Wkr,
Sven Vermeulen
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: Reloading policy fills audit log with "selinux_audit_rule_match: stale rule"
2012-12-30 9:51 Reloading policy fills audit log with "selinux_audit_rule_match: stale rule" Sven Vermeulen
@ 2012-12-31 23:50 ` Sven Vermeulen
0 siblings, 0 replies; 2+ messages in thread
From: Sven Vermeulen @ 2012-12-31 23:50 UTC (permalink / raw)
To: selinux
On Sun, Dec 30, 2012 at 10:51:58AM +0100, Sven Vermeulen wrote:
> Hi guys,
>
> When I reload the SELinux policy on my system (semodule -R) or rebuild
> and reload (semodule -B), for every action I do it generates a dozen or so
> errors like the following:
[...]
Okay, ignore this. I am apparently trying to mix a TCB IMA policy with an
LSM policy which gives some grievances. Using the pure TCB policy works just
fine.
So I learned that, and that you cannot easily disable IMA once it is built
in ;-)
Wkr,
Sven Vermeulen
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2012-12-31 23:51 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-12-30 9:51 Reloading policy fills audit log with "selinux_audit_rule_match: stale rule" Sven Vermeulen
2012-12-31 23:50 ` Sven Vermeulen
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.