On Tue, Sep 12, 2017 at 1:36 PM, Dominick Grift <dac.override@xxxxxxxxx> wrote: > On Tue, Sep 12, 2017 at 12:01:35PM -0400, Stephen Smalley wrote: >> On Sep 12, 2017 7:01 AM, "Dominick Grift" <dac.override@xxxxxxxxx> wrote: >> >> I have extended socket class polcap enabled but i am still seeing "socket" >> class events and i was wondering whether that is to be expected? >> >> avc: denied { create } for pid=10484 comm="nethogs" scontext=wheel.id: >> sysadm.role:nethogs.subj:s0 tcontext=wheel.id:sysadm.role:nethogs.subj:s0 >> tclass=socket permissive=0 >> >> This seems to be common to processes that also create (and map! [1]) >> "packet_socket" sockets (tcpdump/nethogs) >> >> [1] avc: denied { map } for pid=10525 comm="nethogs" >> path="socket:[56040]" dev="sockfs" ino=56040 >> scontext=wheel.id:sysadm.role:nethogs.subj:s0 >> tcontext=wheel.id:sysadm.role:nethogs.subj:s0 tclass=packet_socket >> permissive=0 >> >> >> No, that is not expected. Can you enable sys call audit and get those >> records? > > type=PROCTITLE msg=audit(09/12/2017 19:35:54.063:4458) : proctitle=nethogs enp8s0 > type=SYSCALL msg=audit(09/12/2017 19:35:54.063:4458) : arch=x86_64 syscall=socket success=yes exit=5 a0=local a1=SOCK_RAW a2=ip a3=0xb4 items=0 ppid=3251 pid=8963 auid=kcinimod uid=root gid=root euid=root suid=root fsuid=root egid=root sgid=root fsgid=root tty=pts5 ses=1 comm=nethogs exe=/usr/sbin/nethogs subj=wheel.id:sysadm.role:nethogs.subj:s0 key=(null) > type=AVC msg=audit(09/12/2017 19:35:54.063:4458) : avc: denied { create } for pid=8963 comm=nethogs scontext=wheel.id:sysadm.role:nethogs.subj:s0 tcontext=wheel.id:sysadm.role:nethogs.subj:s0 tclass=socket permissive=1 Ah ha, AF_UNIX/SOCK_RAW, that's the problem. Luis Ressel fixed this (see the commit below) and it should make it up to Linus during the current merge window (eventually, maybe, hopefully). If you run Fedora Rawhide, you can try one of recent kernel builds in the COPR repo below, it should have the fix. * https://copr.fedorainfracloud.org/coprs/pcmoore/kernel-secnext commit 2a764b529ae57bed61da2c90ff132b9fec97f80b Author: Luis Ressel <aranea@xxxxxxxx> Date: Tue Jul 25 15:13:41 2017 -0400 selinux: Assign proper class to PF_UNIX/SOCK_RAW sockets For PF_UNIX, SOCK_RAW is synonymous with SOCK_DGRAM (cf. net/unix/af_unix.c). This is a tad obscure, but libpcap uses it. Signed-off-by: Luis Ressel <aranea@xxxxxxxx> Acked-by: Stephen Smalley <sds@xxxxxxxxxxxxx> Signed-off-by: Paul Moore <paul@xxxxxxxxxxxxxx> -- paul moore www.paul-moore.com