* SELinux policy reload cannot be sent to audit system
@ 2015-11-03 16:05 Laurent Bigonville
2015-11-03 16:28 ` Steve Grubb
0 siblings, 1 reply; 14+ messages in thread
From: Laurent Bigonville @ 2015-11-03 16:05 UTC (permalink / raw)
To: linux-audit
Hi,
With dbus 1.10.2 (on Debian), when I'm running "semodule -B", the system
dbus daemon is complaining with the following message:
nov 03 15:02:57 soldur dbus[1057]: Can't send to audit system: USER_AVC
avc: received policyload notice (seqno=3) exe="/usr/bin/dbus-daemon"
sauid=102 hostname=? addr=? terminal=?
This is the system dbus daemon running as "messagebus":
message+ 1057 0.0 0.0 127756 4524 ? Ssl 10:39 0:11
/usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile
--systemd-activation
Looking at the capabilities:
$ sudo getpcaps 1057
Capabilities for `1057': = cap_audit_write+ep
All other user_avc seems to be properly logged in audit.
An idea?
Cheers,
Laurent Bigonville
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: SELinux policy reload cannot be sent to audit system
2015-11-03 16:05 SELinux policy reload cannot be sent to audit system Laurent Bigonville
@ 2015-11-03 16:28 ` Steve Grubb
2015-11-03 16:38 ` Paul Moore
2015-11-03 17:12 ` Laurent Bigonville
0 siblings, 2 replies; 14+ messages in thread
From: Steve Grubb @ 2015-11-03 16:28 UTC (permalink / raw)
To: linux-audit
On Tuesday, November 03, 2015 05:05:55 PM Laurent Bigonville wrote:
> Hi,
>
> With dbus 1.10.2 (on Debian), when I'm running "semodule -B", the system
> dbus daemon is complaining with the following message:
>
> nov 03 15:02:57 soldur dbus[1057]: Can't send to audit system: USER_AVC
> avc: received policyload notice (seqno=3) exe="/usr/bin/dbus-daemon"
> sauid=102 hostname=? addr=? terminal=?
>
> This is the system dbus daemon running as "messagebus":
>
> message+ 1057 0.0 0.0 127756 4524 ? Ssl 10:39 0:11
> /usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile
> --systemd-activation
>
> Looking at the capabilities:
>
> $ sudo getpcaps 1057
> Capabilities for `1057': = cap_audit_write+ep
>
> All other user_avc seems to be properly logged in audit.
>
> An idea?
I'd patch it to syslog errno and other information to locate the syscall
that's failing. Did socket fail? Did the send fail? Does it work in permissive
mode?
-Steve
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: SELinux policy reload cannot be sent to audit system
2015-11-03 16:28 ` Steve Grubb
@ 2015-11-03 16:38 ` Paul Moore
2015-11-03 17:12 ` Laurent Bigonville
1 sibling, 0 replies; 14+ messages in thread
From: Paul Moore @ 2015-11-03 16:38 UTC (permalink / raw)
To: Steve Grubb; +Cc: linux-audit
On Tue, Nov 3, 2015 at 11:28 AM, Steve Grubb <sgrubb@redhat.com> wrote:
> On Tuesday, November 03, 2015 05:05:55 PM Laurent Bigonville wrote:
>> Hi,
>>
>> With dbus 1.10.2 (on Debian), when I'm running "semodule -B", the system
>> dbus daemon is complaining with the following message:
>>
>> nov 03 15:02:57 soldur dbus[1057]: Can't send to audit system: USER_AVC
>> avc: received policyload notice (seqno=3) exe="/usr/bin/dbus-daemon"
>> sauid=102 hostname=? addr=? terminal=?
>>
>> This is the system dbus daemon running as "messagebus":
>>
>> message+ 1057 0.0 0.0 127756 4524 ? Ssl 10:39 0:11
>> /usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile
>> --systemd-activation
>>
>> Looking at the capabilities:
>>
>> $ sudo getpcaps 1057
>> Capabilities for `1057': = cap_audit_write+ep
>>
>> All other user_avc seems to be properly logged in audit.
>>
>> An idea?
>
> I'd patch it to syslog errno and other information to locate the syscall
> that's failing. Did socket fail? Did the send fail? Does it work in permissive
> mode?
I would also verify that your loaded SELinux policy is not blocking
the CAP_AUDIT_WRITE capability or the netlink_audit_socket:nlmsg_relay
permission.
--
paul moore
www.paul-moore.com
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: SELinux policy reload cannot be sent to audit system
2015-11-03 16:28 ` Steve Grubb
2015-11-03 16:38 ` Paul Moore
@ 2015-11-03 17:12 ` Laurent Bigonville
2015-11-03 19:33 ` Steve Grubb
1 sibling, 1 reply; 14+ messages in thread
From: Laurent Bigonville @ 2015-11-03 17:12 UTC (permalink / raw)
To: linux-audit
Le 03/11/15 17:28, Steve Grubb a écrit :
> On Tuesday, November 03, 2015 05:05:55 PM Laurent Bigonville wrote:
>> Hi,
>>
>> With dbus 1.10.2 (on Debian), when I'm running "semodule -B", the system
>> dbus daemon is complaining with the following message:
>>
>> nov 03 15:02:57 soldur dbus[1057]: Can't send to audit system: USER_AVC
>> avc: received policyload notice (seqno=3) exe="/usr/bin/dbus-daemon"
>> sauid=102 hostname=? addr=? terminal=?
>>
>> This is the system dbus daemon running as "messagebus":
>>
>> message+ 1057 0.0 0.0 127756 4524 ? Ssl 10:39 0:11
>> /usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile
>> --systemd-activation
>>
>> Looking at the capabilities:
>>
>> $ sudo getpcaps 1057
>> Capabilities for `1057': = cap_audit_write+ep
>>
>> All other user_avc seems to be properly logged in audit.
>>
>> An idea?
> I'd patch it to syslog errno and other information to locate the syscall
> that's failing. Did socket fail? Did the send fail? Does it work in permissive
> mode?
I'm running in permissive mode.
I'm seeing a netlink open to the audit:
dbus-daem 1057 messagebus 7u netlink 0t0 15248 AUDIT
Apparently audit_send() returns -1
I've been to reproduce this on F23 as well.
BTW if I'm trying to compile audit with gcc optimization disabled (-O0)
I get:
libtool: link: gcc -D_GNU_SOURCE -g -O0 -fstack-protector-strong
-Wformat -Werror=format-security -Wl,-z -Wl,relro -Wl,--as-needed -o
.libs/auvirt auvirt.o auvirt-list.o ausearch-time.o -L../../auparse
/<<PKGBUILDDIR>>/debian/build/auparse/.libs/libauparse.so
auvirt.o: In function `process_machine_id_event':
/<<PKGBUILDDIR>>/debian/build/tools/auvirt/../../../../tools/auvirt/auvirt.c:484:
undefined reference to `copy_str'
Cheers,
Laurent Bigonville
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: SELinux policy reload cannot be sent to audit system
2015-11-03 17:12 ` Laurent Bigonville
@ 2015-11-03 19:33 ` Steve Grubb
2015-11-03 20:08 ` Richard Guy Briggs
0 siblings, 1 reply; 14+ messages in thread
From: Steve Grubb @ 2015-11-03 19:33 UTC (permalink / raw)
To: linux-audit
On Tuesday, November 03, 2015 06:12:07 PM Laurent Bigonville wrote:
> Le 03/11/15 17:28, Steve Grubb a écrit :
> > On Tuesday, November 03, 2015 05:05:55 PM Laurent Bigonville wrote:
> >> Hi,
> >>
> >> With dbus 1.10.2 (on Debian), when I'm running "semodule -B", the system
> >> dbus daemon is complaining with the following message:
> >>
> >> nov 03 15:02:57 soldur dbus[1057]: Can't send to audit system: USER_AVC
> >> avc: received policyload notice (seqno=3) exe="/usr/bin/dbus-daemon"
> >> sauid=102 hostname=? addr=? terminal=?
> >>
> >> This is the system dbus daemon running as "messagebus":
> >>
> >> message+ 1057 0.0 0.0 127756 4524 ? Ssl 10:39 0:11
> >> /usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile
> >> --systemd-activation
> >>
> >> Looking at the capabilities:
> >>
> >> $ sudo getpcaps 1057
> >> Capabilities for `1057': = cap_audit_write+ep
> >>
> >> All other user_avc seems to be properly logged in audit.
> >>
> >> An idea?
> >
> > I'd patch it to syslog errno and other information to locate the syscall
> > that's failing. Did socket fail? Did the send fail? Does it work in
> > permissive mode?
>
> I'm running in permissive mode.
>
> I'm seeing a netlink open to the audit:
>
> dbus-daem 1057 messagebus 7u netlink 0t0 15248 AUDIT
>
> Apparently audit_send() returns -1
Since its -1, that would be an EPERM. No idea where this is coming from if you
have CAP_AUDIT_WRITE. I use pscap to check that.
> I've been to reproduce this on F23 as well.
I have not played around with that yet.
> BTW if I'm trying to compile audit with gcc optimization disabled (-O0)
> I get:
>
> libtool: link: gcc -D_GNU_SOURCE -g -O0 -fstack-protector-strong
> -Wformat -Werror=format-security -Wl,-z -Wl,relro -Wl,--as-needed -o
> .libs/auvirt auvirt.o auvirt-list.o ausearch-time.o -L../../auparse
> /<<PKGBUILDDIR>>/debian/build/auparse/.libs/libauparse.so
> auvirt.o: In function `process_machine_id_event':
> /<<PKGBUILDDIR>>/debian/build/tools/auvirt/../../../../tools/auvirt/auvirt.c
> :484: undefined reference to `copy_str'
Thanks. I see a similar report with a patch from yoctoproject.org whatever
that is. I don't recall seeing the patch sent here. They list it as a C99
compiler change in semantics for inline functions. I have fixed this differently
in the upstream code as commit #1132
https://fedorahosted.org/audit/changeset/1132
Thanks,
-Steve
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: SELinux policy reload cannot be sent to audit system
2015-11-03 19:33 ` Steve Grubb
@ 2015-11-03 20:08 ` Richard Guy Briggs
2015-11-03 20:48 ` Laurent Bigonville
0 siblings, 1 reply; 14+ messages in thread
From: Richard Guy Briggs @ 2015-11-03 20:08 UTC (permalink / raw)
To: Steve Grubb; +Cc: linux-audit
On 15/11/03, Steve Grubb wrote:
> On Tuesday, November 03, 2015 06:12:07 PM Laurent Bigonville wrote:
> > Le 03/11/15 17:28, Steve Grubb a écrit :
> > > On Tuesday, November 03, 2015 05:05:55 PM Laurent Bigonville wrote:
> > >> Hi,
> > >>
> > >> With dbus 1.10.2 (on Debian), when I'm running "semodule -B", the system
> > >> dbus daemon is complaining with the following message:
> > >>
> > >> nov 03 15:02:57 soldur dbus[1057]: Can't send to audit system: USER_AVC
> > >> avc: received policyload notice (seqno=3) exe="/usr/bin/dbus-daemon"
> > >> sauid=102 hostname=? addr=? terminal=?
> > >>
> > >> This is the system dbus daemon running as "messagebus":
> > >>
> > >> message+ 1057 0.0 0.0 127756 4524 ? Ssl 10:39 0:11
> > >> /usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile
> > >> --systemd-activation
> > >>
> > >> Looking at the capabilities:
> > >>
> > >> $ sudo getpcaps 1057
> > >> Capabilities for `1057': = cap_audit_write+ep
> > >>
> > >> All other user_avc seems to be properly logged in audit.
> > >>
> > >> An idea?
> > >
> > > I'd patch it to syslog errno and other information to locate the syscall
> > > that's failing. Did socket fail? Did the send fail? Does it work in
> > > permissive mode?
> >
> > I'm running in permissive mode.
> >
> > I'm seeing a netlink open to the audit:
> >
> > dbus-daem 1057 messagebus 7u netlink 0t0 15248 AUDIT
> >
> > Apparently audit_send() returns -1
>
> Since its -1, that would be an EPERM. No idea where this is coming from if you
> have CAP_AUDIT_WRITE. I use pscap to check that.
Are you in a container of any kind or any non-init USER namespace? I
can't see it being denied otherwise assuming it is only trying to send
AUDIT_USER_* class messages. (This assumes upstream kernel.)
I guess I have to ask which kernel too, since changes to NET and PID
namespaces are somewhat recent and Debian tends on the side of
conservative to be stable.
> > I've been to reproduce this on F23 as well.
>
> I have not played around with that yet.
What kernel is that?
> > BTW if I'm trying to compile audit with gcc optimization disabled (-O0)
> > I get:
> >
> > libtool: link: gcc -D_GNU_SOURCE -g -O0 -fstack-protector-strong
> > -Wformat -Werror=format-security -Wl,-z -Wl,relro -Wl,--as-needed -o
> > .libs/auvirt auvirt.o auvirt-list.o ausearch-time.o -L../../auparse
> > /<<PKGBUILDDIR>>/debian/build/auparse/.libs/libauparse.so
> > auvirt.o: In function `process_machine_id_event':
> > /<<PKGBUILDDIR>>/debian/build/tools/auvirt/../../../../tools/auvirt/auvirt.c
> > :484: undefined reference to `copy_str'
>
> Thanks. I see a similar report with a patch from yoctoproject.org whatever
> that is. I don't recall seeing the patch sent here. They list it as a C99
> compiler change in semantics for inline functions. I have fixed this differently
> in the upstream code as commit #1132
Yocto is a framework for developing distributions for embedded devices.
> https://fedorahosted.org/audit/changeset/1132
>
> Thanks,
> -Steve
- RGB
--
Richard Guy Briggs <rbriggs@redhat.com>
Senior Software Engineer, Kernel Security, AMER ENG Base Operating Systems, Red Hat
Remote, Ottawa, Canada
Voice: +1.647.777.2635, Internal: (81) 32635, Alt: +1.613.693.0684x3545
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: SELinux policy reload cannot be sent to audit system
2015-11-03 20:08 ` Richard Guy Briggs
@ 2015-11-03 20:48 ` Laurent Bigonville
2015-11-05 3:23 ` Steve Grubb
0 siblings, 1 reply; 14+ messages in thread
From: Laurent Bigonville @ 2015-11-03 20:48 UTC (permalink / raw)
To: linux-audit
Le 03/11/15 21:08, Richard Guy Briggs a écrit :
> On 15/11/03, Steve Grubb wrote:
>> On Tuesday, November 03, 2015 06:12:07 PM Laurent Bigonville wrote:
>>>
>>> I'm running in permissive mode.
>>>
>>> I'm seeing a netlink open to the audit:
>>>
>>> dbus-daem 1057 messagebus 7u netlink 0t0 15248 AUDIT
>>>
>>> Apparently audit_send() returns -1
>> Since its -1, that would be an EPERM. No idea where this is coming from if you
>> have CAP_AUDIT_WRITE. I use pscap to check that.
> Are you in a container of any kind or any non-init USER namespace? I
> can't see it being denied otherwise assuming it is only trying to send
> AUDIT_USER_* class messages. (This assumes upstream kernel.)
No, I initially saw this on my laptop and then tested on F23 in kvm.
> I guess I have to ask which kernel too, since changes to NET and PID
> namespaces are somewhat recent and Debian tends on the side of
> conservative to be stable.
I'm under debian unstable and the kernel I'm running is 4.2
>
>>> I've been to reproduce this on F23 as well.
>> I have not played around with that yet.
> What kernel is that?
4.2 too apparently.
Cheers,
Laurent Bigonville
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: SELinux policy reload cannot be sent to audit system
2015-11-03 20:48 ` Laurent Bigonville
@ 2015-11-05 3:23 ` Steve Grubb
2015-11-05 8:32 ` Laurent Bigonville
0 siblings, 1 reply; 14+ messages in thread
From: Steve Grubb @ 2015-11-05 3:23 UTC (permalink / raw)
To: linux-audit
On Tuesday, November 03, 2015 09:48:31 PM Laurent Bigonville wrote:
> Le 03/11/15 21:08, Richard Guy Briggs a écrit :
> > On 15/11/03, Steve Grubb wrote:
> >> On Tuesday, November 03, 2015 06:12:07 PM Laurent Bigonville wrote:
> >>> I'm running in permissive mode.
> >>>
> >>> I'm seeing a netlink open to the audit:
> >>>
> >>> dbus-daem 1057 messagebus 7u netlink 0t0 15248 AUDIT
> >>>
> >>> Apparently audit_send() returns -1
> >>
> >> Since its -1, that would be an EPERM. No idea where this is coming from
> >> if you have CAP_AUDIT_WRITE. I use pscap to check that.
> >
> > Are you in a container of any kind or any non-init USER namespace? I
> > can't see it being denied otherwise assuming it is only trying to send
> > AUDIT_USER_* class messages. (This assumes upstream kernel.)
>
> No, I initially saw this on my laptop and then tested on F23 in kvm.
I tested this on Fedora 22 and did not get a USER_AVC from dbus, but I also
did not get an error message in syslog. So, I don't know what to make of it.
(And for the record, I have a bz open saying that USER_AVC is the wrong event
type. They are blaming libselinux but I blame them for not using
AUDIT_USER_MAC_POLICY_LOAD.)
-Steve
> > I guess I have to ask which kernel too, since changes to NET and PID
> > namespaces are somewhat recent and Debian tends on the side of
> > conservative to be stable.
>
> I'm under debian unstable and the kernel I'm running is 4.2
>
> >>> I've been to reproduce this on F23 as well.
> >>
> >> I have not played around with that yet.
> >
> > What kernel is that?
>
> 4.2 too apparently.
>
> Cheers,
>
> Laurent Bigonville
>
> --
> Linux-audit mailing list
> Linux-audit@redhat.com
> https://www.redhat.com/mailman/listinfo/linux-audit
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: SELinux policy reload cannot be sent to audit system
2015-11-05 3:23 ` Steve Grubb
@ 2015-11-05 8:32 ` Laurent Bigonville
2015-11-05 9:26 ` Laurent Bigonville
2015-11-05 23:03 ` Steve Grubb
0 siblings, 2 replies; 14+ messages in thread
From: Laurent Bigonville @ 2015-11-05 8:32 UTC (permalink / raw)
To: linux-audit
Le 05/11/15 04:23, Steve Grubb a écrit :
> On Tuesday, November 03, 2015 09:48:31 PM Laurent Bigonville wrote:
>> Le 03/11/15 21:08, Richard Guy Briggs a écrit :
>>> On 15/11/03, Steve Grubb wrote:
>>>> On Tuesday, November 03, 2015 06:12:07 PM Laurent Bigonville wrote:
>>>>> I'm running in permissive mode.
>>>>>
>>>>> I'm seeing a netlink open to the audit:
>>>>>
>>>>> dbus-daem 1057 messagebus 7u netlink 0t0 15248 AUDIT
>>>>>
>>>>> Apparently audit_send() returns -1
>>>> Since its -1, that would be an EPERM. No idea where this is coming from
>>>> if you have CAP_AUDIT_WRITE. I use pscap to check that.
>>> Are you in a container of any kind or any non-init USER namespace? I
>>> can't see it being denied otherwise assuming it is only trying to send
>>> AUDIT_USER_* class messages. (This assumes upstream kernel.)
>> No, I initially saw this on my laptop and then tested on F23 in kvm.
> I tested this on Fedora 22 and did not get a USER_AVC from dbus, but I also
> did not get an error message in syslog. So, I don't know what to make of it.
> (And for the record, I have a bz open saying that USER_AVC is the wrong event
> type. They are blaming libselinux but I blame them for not using
> AUDIT_USER_MAC_POLICY_LOAD.)
The audit code in dbus has been refactored a bit in the version present
F23 and debian unstable, so it might be related to this that.
Do you still have the number of that bz bug?
Cheers,
Laurent Bigonville
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: SELinux policy reload cannot be sent to audit system
2015-11-05 8:32 ` Laurent Bigonville
@ 2015-11-05 9:26 ` Laurent Bigonville
2015-11-05 13:20 ` Steve Grubb
2015-11-05 23:03 ` Steve Grubb
1 sibling, 1 reply; 14+ messages in thread
From: Laurent Bigonville @ 2015-11-05 9:26 UTC (permalink / raw)
To: linux-audit
Le 05/11/15 09:32, Laurent Bigonville a écrit :
> Le 05/11/15 04:23, Steve Grubb a écrit :
>> I tested this on Fedora 22 and did not get a USER_AVC from dbus, but
>> I also
>> did not get an error message in syslog. So, I don't know what to make
>> of it.
>> (And for the record, I have a bz open saying that USER_AVC is the
>> wrong event
>> type. They are blaming libselinux but I blame them for not using
>> AUDIT_USER_MAC_POLICY_LOAD.)
> The audit code in dbus has been refactored a bit in the version
> present F23 and debian unstable, so it might be related to this that.
>
> Do you still have the number of that bz bug?
BTW, systemd is also apparently sending a USER_AVC event when the policy
is reloaded.
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: SELinux policy reload cannot be sent to audit system
2015-11-05 9:26 ` Laurent Bigonville
@ 2015-11-05 13:20 ` Steve Grubb
0 siblings, 0 replies; 14+ messages in thread
From: Steve Grubb @ 2015-11-05 13:20 UTC (permalink / raw)
To: linux-audit
On Thursday, November 05, 2015 10:26:17 AM Laurent Bigonville wrote:
> Le 05/11/15 09:32, Laurent Bigonville a écrit :
> > Le 05/11/15 04:23, Steve Grubb a écrit :
> >> I tested this on Fedora 22 and did not get a USER_AVC from dbus, but
> >> I also did not get an error message in syslog. So, I don't know what to
> >> make of it.
> >> (And for the record, I have a bz open saying that USER_AVC is the
> >> wrong event type. They are blaming libselinux but I blame them for not
> >> using AUDIT_USER_MAC_POLICY_LOAD.)
> >
> > The audit code in dbus has been refactored a bit in the version
> > present F23 and debian unstable, so it might be related to this that.
> >
> > Do you still have the number of that bz bug?
>
> BTW, systemd is also apparently sending a USER_AVC event when the policy
> is reloaded.
This is bz 1195330.
-Steve
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: SELinux policy reload cannot be sent to audit system
2015-11-05 8:32 ` Laurent Bigonville
2015-11-05 9:26 ` Laurent Bigonville
@ 2015-11-05 23:03 ` Steve Grubb
2015-11-05 23:19 ` Laurent Bigonville
1 sibling, 1 reply; 14+ messages in thread
From: Steve Grubb @ 2015-11-05 23:03 UTC (permalink / raw)
To: linux-audit
On Thursday, November 05, 2015 09:32:09 AM Laurent Bigonville wrote:
> Le 05/11/15 04:23, Steve Grubb a écrit :
> > On Tuesday, November 03, 2015 09:48:31 PM Laurent Bigonville wrote:
> >> Le 03/11/15 21:08, Richard Guy Briggs a écrit :
> >>> On 15/11/03, Steve Grubb wrote:
> >>>> On Tuesday, November 03, 2015 06:12:07 PM Laurent Bigonville wrote:
> >>>>> I'm running in permissive mode.
> >>>>>
> >>>>> I'm seeing a netlink open to the audit:
> >>>>>
> >>>>> dbus-daem 1057 messagebus 7u netlink 0t0 15248 AUDIT
> >>>>>
> >>>>> Apparently audit_send() returns -1
> >>>>
> >>>> Since its -1, that would be an EPERM. No idea where this is coming from
> >>>> if you have CAP_AUDIT_WRITE. I use pscap to check that.
> >>>
> >>> Are you in a container of any kind or any non-init USER namespace? I
> >>> can't see it being denied otherwise assuming it is only trying to send
> >>> AUDIT_USER_* class messages. (This assumes upstream kernel.)
> >>
> >> No, I initially saw this on my laptop and then tested on F23 in kvm.
> >
> > I tested this on Fedora 22 and did not get a USER_AVC from dbus, but I
> > also
> > did not get an error message in syslog. So, I don't know what to make of
> > it. (And for the record, I have a bz open saying that USER_AVC is the
> > wrong event type. They are blaming libselinux but I blame them for not
> > using
> > AUDIT_USER_MAC_POLICY_LOAD.)
>
> The audit code in dbus has been refactored a bit in the version present
> F23 and debian unstable, so it might be related to this that.
I filed a bz to get this fixed:
https://bugzilla.redhat.com/show_bug.cgi?id=1278602
The root cause is listed in the bug. Dbus has 2 threads, one with
CAP_AUDIT_WRITE and one without. The one without is the one trying to send the
event.
-Steve
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: SELinux policy reload cannot be sent to audit system
2015-11-05 23:03 ` Steve Grubb
@ 2015-11-05 23:19 ` Laurent Bigonville
2015-11-06 1:25 ` Paul Moore
0 siblings, 1 reply; 14+ messages in thread
From: Laurent Bigonville @ 2015-11-05 23:19 UTC (permalink / raw)
To: linux-audit
Le 06/11/15 00:03, Steve Grubb a écrit :
> On Thursday, November 05, 2015 09:32:09 AM Laurent Bigonville wrote:
>> Le 05/11/15 04:23, Steve Grubb a écrit :
>>> On Tuesday, November 03, 2015 09:48:31 PM Laurent Bigonville wrote:
>>>> Le 03/11/15 21:08, Richard Guy Briggs a écrit :
>>>>> On 15/11/03, Steve Grubb wrote:
>>>>>> On Tuesday, November 03, 2015 06:12:07 PM Laurent Bigonville wrote:
>>>>>>> I'm running in permissive mode.
>>>>>>>
>>>>>>> I'm seeing a netlink open to the audit:
>>>>>>>
>>>>>>> dbus-daem 1057 messagebus 7u netlink 0t0 15248 AUDIT
>>>>>>>
>>>>>>> Apparently audit_send() returns -1
>>>>>> Since its -1, that would be an EPERM. No idea where this is coming from
>>>>>> if you have CAP_AUDIT_WRITE. I use pscap to check that.
>>>>> Are you in a container of any kind or any non-init USER namespace? I
>>>>> can't see it being denied otherwise assuming it is only trying to send
>>>>> AUDIT_USER_* class messages. (This assumes upstream kernel.)
>>>> No, I initially saw this on my laptop and then tested on F23 in kvm.
>>> I tested this on Fedora 22 and did not get a USER_AVC from dbus, but I
>>> also
>>> did not get an error message in syslog. So, I don't know what to make of
>>> it. (And for the record, I have a bz open saying that USER_AVC is the
>>> wrong event type. They are blaming libselinux but I blame them for not
>>> using
>>> AUDIT_USER_MAC_POLICY_LOAD.)
>> The audit code in dbus has been refactored a bit in the version present
>> F23 and debian unstable, so it might be related to this that.
>
> I filed a bz to get this fixed:
> https://bugzilla.redhat.com/show_bug.cgi?id=1278602
>
> The root cause is listed in the bug. Dbus has 2 threads, one with
> CAP_AUDIT_WRITE and one without. The one without is the one trying to send the
> event.
Thanks,
I've opened a bug upstream too:
https://bugs.freedesktop.org/show_bug.cgi?id=92832
^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: SELinux policy reload cannot be sent to audit system
2015-11-05 23:19 ` Laurent Bigonville
@ 2015-11-06 1:25 ` Paul Moore
0 siblings, 0 replies; 14+ messages in thread
From: Paul Moore @ 2015-11-06 1:25 UTC (permalink / raw)
To: Laurent Bigonville, Steve Grubb; +Cc: linux-audit
Thanks guys, it looks like you found the root cause. It was on my
todo list to play with this on Rawhide but I wanted to get through
Richard's patches first.
On Thu, Nov 5, 2015 at 6:19 PM, Laurent Bigonville <bigon@debian.org> wrote:
> Le 06/11/15 00:03, Steve Grubb a écrit :
>
>> On Thursday, November 05, 2015 09:32:09 AM Laurent Bigonville wrote:
>>>
>>> Le 05/11/15 04:23, Steve Grubb a écrit :
>>>>
>>>> On Tuesday, November 03, 2015 09:48:31 PM Laurent Bigonville wrote:
>>>>>
>>>>> Le 03/11/15 21:08, Richard Guy Briggs a écrit :
>>>>>>
>>>>>> On 15/11/03, Steve Grubb wrote:
>>>>>>>
>>>>>>> On Tuesday, November 03, 2015 06:12:07 PM Laurent Bigonville wrote:
>>>>>>>>
>>>>>>>> I'm running in permissive mode.
>>>>>>>>
>>>>>>>> I'm seeing a netlink open to the audit:
>>>>>>>>
>>>>>>>> dbus-daem 1057 messagebus 7u netlink 0t0 15248 AUDIT
>>>>>>>>
>>>>>>>> Apparently audit_send() returns -1
>>>>>>>
>>>>>>> Since its -1, that would be an EPERM. No idea where this is coming
>>>>>>> from
>>>>>>> if you have CAP_AUDIT_WRITE. I use pscap to check that.
>>>>>>
>>>>>> Are you in a container of any kind or any non-init USER namespace? I
>>>>>> can't see it being denied otherwise assuming it is only trying to send
>>>>>> AUDIT_USER_* class messages. (This assumes upstream kernel.)
>>>>>
>>>>> No, I initially saw this on my laptop and then tested on F23 in kvm.
>>>>
>>>> I tested this on Fedora 22 and did not get a USER_AVC from dbus, but I
>>>> also
>>>> did not get an error message in syslog. So, I don't know what to make of
>>>> it. (And for the record, I have a bz open saying that USER_AVC is the
>>>> wrong event type. They are blaming libselinux but I blame them for not
>>>> using
>>>> AUDIT_USER_MAC_POLICY_LOAD.)
>>>
>>> The audit code in dbus has been refactored a bit in the version present
>>> F23 and debian unstable, so it might be related to this that.
>>
>>
>> I filed a bz to get this fixed:
>> https://bugzilla.redhat.com/show_bug.cgi?id=1278602
>>
>> The root cause is listed in the bug. Dbus has 2 threads, one with
>> CAP_AUDIT_WRITE and one without. The one without is the one trying to send
>> the
>> event.
>
> Thanks,
>
> I've opened a bug upstream too:
> https://bugs.freedesktop.org/show_bug.cgi?id=92832
>
>
> --
> Linux-audit mailing list
> Linux-audit@redhat.com
> https://www.redhat.com/mailman/listinfo/linux-audit
--
paul moore
www.paul-moore.com
--
Linux-audit mailing list
Linux-audit@redhat.com
https://www.redhat.com/mailman/listinfo/linux-audit
^ permalink raw reply [flat|nested] 14+ messages in thread
end of thread, other threads:[~2015-11-06 1:25 UTC | newest]
Thread overview: 14+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-11-03 16:05 SELinux policy reload cannot be sent to audit system Laurent Bigonville
2015-11-03 16:28 ` Steve Grubb
2015-11-03 16:38 ` Paul Moore
2015-11-03 17:12 ` Laurent Bigonville
2015-11-03 19:33 ` Steve Grubb
2015-11-03 20:08 ` Richard Guy Briggs
2015-11-03 20:48 ` Laurent Bigonville
2015-11-05 3:23 ` Steve Grubb
2015-11-05 8:32 ` Laurent Bigonville
2015-11-05 9:26 ` Laurent Bigonville
2015-11-05 13:20 ` Steve Grubb
2015-11-05 23:03 ` Steve Grubb
2015-11-05 23:19 ` Laurent Bigonville
2015-11-06 1:25 ` Paul Moore
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).