Benjy Grogan wrote:
On 6/20/06, Stephen Smalley <sds@xxxxxxxxxxxxx> wrote:
On Tue, 2006-06-20 at 15:46 -0400, Benjy Grogan wrote:
> How do you verify that you're using enableaudit.pp and not base.pp? I
> get these avcs after building and loading enableaudit but my Google
> Earth policy still gives off zero avcs after 20 minutes of use. Which
> would be great if it actually ran in enforcing mode.
>
> Jun 20 15:18:03 localhost kernel: audit(1150831083.862:3836): avc:
> denied { siginh } for
> pid=7029 comm="setfiles" scontext=user_u:system_r:semanage_t:s0
> tcontext=user_u:system_r:setfiles_t:s0 tclass=process
> Jun 20 15:18:03 localhost kernel: audit(1150831083.862:3837): avc:
> denied { rlimitinh } for pid=7029 comm="setfiles"
> scontext=user_u:system_r:semanage_t:s0
> tcontext=user_u:system_r:setfiles_t:s0 tclass=process
> Jun 20 15:18:03 localhost kernel: audit(1150831083.862:3838): avc:
> denied { noatsecure } for pid=7029 comm="setfiles"
> scontext=user_u:system_r:semanage_t:s0
> tcontext=user_u:system_r:setfiles_t:s0 tclass=process
Those avcs suggest that you are using enableaudit.pp, as they would
normally be silenced by dontaudit rules. Try running the program under
strace and checking the output to see precisely where it is failing.
One case where we get no auditing at all is the net_admin capability
check upon netlink recv; that will be fixed by a pending patch in the
audit tree. Hopefully googleearth doesn't need that though ;)
Thanks. strace showed me that the problem was my own fault. I was
incorrectly using auditdeny.
I'm currently trying to get my Google Earth selinux policy to allow
CUPS. It's allowed but I find the cupsd_t domain's need to access the
SElinux config and security file contexts strange. You can see below.
Is this normal?
# Google Earth printing to CUPS
is is
gen_require(`
type cupsd_etc_t;
type cupsd_rw_etc_t;
type cupsd_var_run_t;
type ipp_port_t;
')
# how come cupsd_t has been denied these privileges and why would it
need them?
allow cupsd_t security_t:dir search;
allow cupsd_t security_t:file read;
allow cupsd_t selinux_config_t:dir search;
allow cupsd_t selinux_config_t:file { getattr read };
It does not need it. This is only because you are running in permissive
mode. The first access would have been dontaudited and all of the other
avc's would not
been created.
# use CUPS service...
cups_read_config(googleearth_t)
allow googleearth_t cupsd_var_run_t:dir search;
allow googleearth_t self:netlink_route_socket { r_netlink_socket_perms };
corenet_tcp_sendrecv_ipp_port(googleearth_t)
corenet_tcp_connect_ipp_port(googleearth_t)
Benjy
--
Stephen Smalley
National Security Agency
--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list
--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list