On Tue, 2005-03-15 at 13:41 -0500, Stephen Smalley wrote:
Ah, I think SELinux is stopping it. Even in permissive mode.
SELinux
applies a check from the netlink_send() hook, and it doesn't presently
have a mapping for the new audit operations you are introducing, so it
rejects the request as invalid. That security stuff, always getting in
the way ;)
Ok, please incorporate the patch below into your patch so that SELinux
won't prevent using your new audit operations.
Index: linux-2.6/security/selinux/nlmsgtab.c
===================================================================
RCS file: /nfshome/pal/CVS/linux-2.6/security/selinux/nlmsgtab.c,v
retrieving revision 1.3
diff -u -p -r1.3 nlmsgtab.c
--- linux-2.6/security/selinux/nlmsgtab.c 26 Jan 2005 21:21:27 -0000 1.3
+++ linux-2.6/security/selinux/nlmsgtab.c 15 Mar 2005 18:49:29 -0000
@@ -98,6 +98,8 @@ static struct nlmsg_perm nlmsg_audit_per
{ AUDIT_DEL, NETLINK_AUDIT_SOCKET__NLMSG_WRITE },
{ AUDIT_USER, NETLINK_AUDIT_SOCKET__NLMSG_WRITE },
{ AUDIT_LOGIN, NETLINK_AUDIT_SOCKET__NLMSG_WRITE },
+ { AUDIT_WATCH_INS, NETLINK_AUDIT_SOCKET__NLMSG_WRITE },
+ { AUDIT_WATCH_REM, NETLINK_AUDIT_SOCKET__NLMSG_WRITE },
};
--
Stephen Smalley <sds(a)tycho.nsa.gov>
National Security Agency