Re: Setnenforce prevented?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 02/24/2010 03:12 PM, Dominick Grift wrote:
> On 02/24/2010 09:08 PM, Daniel B. Thurman wrote:
>    
>> Issuing the following command:
>> # setenforce 0
>>
>> Results with log message:
>>
>> Feb 24 12:04:31<host>  dbus: avc:  received setenforce notice (enforcing=0)
>> Feb 24 12:04:31<host>  dbus: Can't send to audit system: USER_AVC avc:
>> received setenforce notice (enforcing=0)#012: exe="?" sauid=81
>> hostname=? addr=? terminal=?
>>      
>
The funny/sad thing is this is not an SELinux avc error although it is 
reported as such.  I have sent a patch for this a couple of times.

This is what is happening.  dbus uses SELinux policy and communicates 
with the SELInux subsystem to query whether something is allowed or 
not.  When policy is reloaded the SELinux system sends a message to all 
policy enforcers that there has been a policy reload.

Dbus gets the message that it recieved an updated policy and it decides 
it needs to write the message to the audit subsystem.  If dbus is 
running as root it is allowed and every thing works correctly.  If dbus 
(session_bus) is running as non root, when it tries to send the audit 
message it is blocked by DAC.  (not by SELinux).  Then it reports this 
as an error to the syslog system.

The patch that has been sent to dbus is to understand when it is running 
as non root that it does not need to send audit messages.


--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux