On Tuesday 16 May 2006 10:53, Michael C Thompson wrote:
 > [ resulting log activity:
 > type=AVC msg=audit(1147657744.953:39): avc:  denied  { nlmsg_readpriv }
 > for  pid=2091 comm="auditctl"
 > scontext=root:staff_r:staff_t:s0-s15:c0.c255
 > tcontext=root:staff_r:staff_t:s0-s15:c0.c255 tclass=netlink_audit_socket
 > type=SYSCALL msg=audit(1147657744.953:39): arch=40000003 syscall=102
 > success=yes exit=16 a0=b a1=bfad2760 a2=805b0f8 a3=10 items=0 ppid=2067
 > pid=2091 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0
 > tty=pts1 comm="auditctl" exe="/sbin/auditctl"
 > subj=root:staff_r:staff_t:s0-s15:c0.c255
 > type=SOCKADDR msg=audit(1147657744.953:39):
 > saddr=100000000000000000000000 type=SOCKETCALL
 > msg=audit(1147657744.953:39): nargs=6 a0=3 a1=bfad69fc a2=10 a3=0
 > a4=bfad2790 a5=c
 > ] 
I missed this. This is the smoking gun...why did SE Linux reject the syscall? 
Next time, SE Linux was OK and allowed access. I wonder if this points to an 
avc caching problem since subsequent attempts is just fine.
-Steve