Re: seccomp and audit_enabled

2015-11-06 Thread Tony Jones
On 10/13/2015 01:03 PM, Steve Grubb wrote: >> No, it's the default audit.rules (-D, -b320). No actual rules loaded. >> Let me add some instrumentation and figure out what's going on. auditd >> is masked (via systemd) but systemd-journal seems to set audit_enabled=1 >> during startup (at least on

Re: seccomp and audit_enabled

2015-11-06 Thread Tony Jones
On 10/13/2015 12:19 PM, Paul Moore wrote: > Yes, if systemd is involved it enables audit; we've had some > discussions with the systemd folks about fixing that, but they haven't > gone very far. I'm still a little curious as to why > audit_dummy_context() is false in this case, but I haven't look

Re: [PATCH v3] selinux: export validatetrans decisions

2015-11-06 Thread Paul Moore
On Thursday, October 29, 2015 02:01:42 PM Andrew Perepechko wrote: > Make validatetrans decisions available through selinuxfs. > "/validatetrans" is added to selinuxfs for this purpose. > This functionality is needed by file system servers > implemented in userspace or kernelspace without the VFS >

Re: [PATCH v2] selinux: rate-limit unrecognized netlink message warnings in selinux_nlmsg_perm()

2015-11-06 Thread Paul Moore
On Wednesday, November 04, 2015 04:02:36 PM Vladis Dronov wrote: > Any process is able to send netlink messages with invalid types. > Make the warning rate-limited to prevent too much log spam. > > The warning is supposed to help to find misbehaving programs, so > print the triggering command name