On 11/06/2015 11:10 AM, Laurent Bigonville wrote:
Hi, When the policy is reloaded, systemd and dbus are sending a USER_AVC audit event instead of a USER_MAC_POLICY_LOAD one. Looking at an other object manager (the xserver) it uses the following code: http://cgit.freedesktop.org/xorg/xserver/tree/Xext/xselinux_hooks.c#n300 Can we really link SELINUX_INFO to AUDIT_USER_MAC_POLICY_LOAD? Is there a better way to achieve this? An downstream bug has been opened: https://bugzilla.redhat.com/show_bug.cgi?id=1195330
I think when they introduced the audit support, they should have added a new type value in libselinux for MAC_POLICY_LOAD, and then they could have handled this cleanly in their callback functions. That is what I would do. I guess now we have to figure out how to do so compatibly...
_______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.