All of lore.kernel.org
 help / color / mirror / Atom feed
* Wrong audit message type when policy is reloaded
@ 2015-11-06 16:10 Laurent Bigonville
  2015-11-06 16:29 ` Stephen Smalley
  0 siblings, 1 reply; 3+ messages in thread
From: Laurent Bigonville @ 2015-11-06 16:10 UTC (permalink / raw)
  To: selinux

Hi,

When the policy is reloaded, systemd and dbus are sending a USER_AVC 
audit event instead of a USER_MAC_POLICY_LOAD one.

Looking at an other object manager (the xserver) it uses the following 
code: 
http://cgit.freedesktop.org/xorg/xserver/tree/Xext/xselinux_hooks.c#n300

Can we really link SELINUX_INFO to AUDIT_USER_MAC_POLICY_LOAD? Is there 
a better way to achieve this?

An downstream bug has been opened: 
https://bugzilla.redhat.com/show_bug.cgi?id=1195330

Cheers,

Laurent Bigonville

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Wrong audit message type when policy is reloaded
  2015-11-06 16:10 Wrong audit message type when policy is reloaded Laurent Bigonville
@ 2015-11-06 16:29 ` Stephen Smalley
  2015-12-10 17:53   ` Laurent Bigonville
  0 siblings, 1 reply; 3+ messages in thread
From: Stephen Smalley @ 2015-11-06 16:29 UTC (permalink / raw)
  To: Laurent Bigonville, selinux

On 11/06/2015 11:10 AM, Laurent Bigonville wrote:
> Hi,
>
> When the policy is reloaded, systemd and dbus are sending a USER_AVC
> audit event instead of a USER_MAC_POLICY_LOAD one.
>
> Looking at an other object manager (the xserver) it uses the following
> code:
> http://cgit.freedesktop.org/xorg/xserver/tree/Xext/xselinux_hooks.c#n300
>
> Can we really link SELINUX_INFO to AUDIT_USER_MAC_POLICY_LOAD? Is there
> a better way to achieve this?
>
> An downstream bug has been opened:
> https://bugzilla.redhat.com/show_bug.cgi?id=1195330

I think when they introduced the audit support, they should have added a 
new type value in libselinux for MAC_POLICY_LOAD, and then they could 
have handled this cleanly in their callback functions.  That is what I 
would do.  I guess now we have to figure out how to do so compatibly...

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Wrong audit message type when policy is reloaded
  2015-11-06 16:29 ` Stephen Smalley
@ 2015-12-10 17:53   ` Laurent Bigonville
  0 siblings, 0 replies; 3+ messages in thread
From: Laurent Bigonville @ 2015-12-10 17:53 UTC (permalink / raw)
  To: linux-audit; +Cc: selinux

I guess I should have CCed the linux-audit mailing list from the start.

As said in my initial mail (see bellow) wheb SELinux user object manager 
are reloading the policy, an audit message with a wrong type is logged 
USER_AVC vs USER_MAC_POLICY_LOAD.

Le 06/11/15 17:29, Stephen Smalley a écrit :
> On 11/06/2015 11:10 AM, Laurent Bigonville wrote:
>> Hi,
>>
>> When the policy is reloaded, systemd and dbus are sending a USER_AVC
>> audit event instead of a USER_MAC_POLICY_LOAD one.
>>
>> Looking at an other object manager (the xserver) it uses the following
>> code:
>> http://cgit.freedesktop.org/xorg/xserver/tree/Xext/xselinux_hooks.c#n300
>>
>> Can we really link SELINUX_INFO to AUDIT_USER_MAC_POLICY_LOAD? Is there
>> a better way to achieve this?
>>
>> An downstream bug has been opened:
>> https://bugzilla.redhat.com/show_bug.cgi?id=1195330
>
> I think when they introduced the audit support, they should have added 
> a new type value in libselinux for MAC_POLICY_LOAD, and then they 
> could have handled this cleanly in their callback functions. That is 
> what I would do.  I guess now we have to figure out how to do so 
> compatibly...
>
>

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2015-12-10 17:53 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-11-06 16:10 Wrong audit message type when policy is reloaded Laurent Bigonville
2015-11-06 16:29 ` Stephen Smalley
2015-12-10 17:53   ` Laurent Bigonville

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.