[DSE-Dev] Bug#756731: Bug#756731: selinux-policy-default: Setting SELinux to enforce when using systemd some AVCs are logged during boot

Andreas Florath andre at flonatel.org
Tue Aug 5 07:43:40 UTC 2014


Hello!

As suggested, I retested this with Jessie:
There are still some AVCs logged, but these differ from the ones logged in Wheezy.

Aug  5 09:26:11 debselinux01 kernel: [    1.197831] audit: type=1400 audit(1407223571.360:4): avc:  denied  { net_admin } for  pid=166 comm="systemd-tmpfile" capability=12  scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:system_r:systemd_tmpfiles_t:s0 tclass=capability
Aug  5 09:26:11 debselinux01 kernel: [    1.199479] audit: type=1400 audit(1407223571.360:5): avc:  denied  { read } for  pid=166 comm="systemd-tmpfile" name="urandom" dev="devtmpfs" ino=1033 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file
Aug  5 09:26:11 debselinux01 kernel: [    1.199488] audit: type=1400 audit(1407223571.360:6): avc:  denied  { read } for  pid=166 comm="systemd-tmpfile" name="urandom" dev="devtmpfs" ino=1033 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file
Aug  5 09:26:11 debselinux01 kernel: [    1.199942] audit: type=1400 audit(1407223571.360:7): avc:  denied  { read } for  pid=166 comm="systemd-tmpfile" name="urandom" dev="devtmpfs" ino=1033 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:object_r:urandom_device_t:s0 tclass=chr_file
Aug  5 09:26:11 debselinux01 kernel: [    1.202553] audit: type=1400 audit(1407223571.364:8): avc:  denied  { getcap } for  pid=166 comm="systemd-tmpfile" scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:system_r:systemd_tmpfiles_t:s0 tclass=process
Aug  5 09:26:11 debselinux01 kernel: [    1.202763] audit: type=1400 audit(1407223571.364:9): avc:  denied  { getattr } for  pid=166 comm="systemd-tmpfile" path="/dev/autofs" dev="devtmpfs" ino=5287 scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:object_r:autofs_device_t:s0 tclass=chr_file
Aug  5 09:26:11 debselinux01 kernel: [    1.203130] audit: type=1400 audit(1407223571.364:10): avc:  denied  { getcap } for  pid=166 comm="systemd-tmpfile" scontext=system_u:system_r:systemd_tmpfiles_t:s0 tcontext=system_u:system_r:systemd_tmpfiles_t:s0 tclass=process

Kind regards

Andre


-- System Information:
Debian Release: jessie/sid
  APT prefers testing-updates
  APT policy: (500, 'testing-updates'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 3.14-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages selinux-policy-default depends on:
ii  libpam-modules   1.1.8-3
ii  libselinux1      2.3-1
ii  libsepol1        2.3-1
ii  policycoreutils  2.3-1
ii  python           2.7.8-1
ii  selinux-utils    2.3-1

Versions of packages selinux-policy-default recommends:
ii  checkpolicy  2.3-1
ii  setools      3.3.8-3

Versions of packages selinux-policy-default suggests:
pn  logcheck        <none>
pn  syslog-summary  <none>

-- no debconf information



More information about the SELinux-devel mailing list