Bug 1391907 - tools should also search for USER_SELINUX_ERR and USER_MAC_POLICY_LOAD messages
Summary: tools should also search for USER_SELINUX_ERR and USER_MAC_POLICY_LOAD messages
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: policycoreutils
Version: 7.4
Hardware: All
OS: Linux
low
low
Target Milestone: rc
: ---
Assignee: Vit Mojzis
QA Contact: Milos Malik
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-11-04 11:09 UTC by Milos Malik
Modified: 2019-02-27 13:55 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-02-27 13:55:38 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Milos Malik 2016-11-04 11:09:19 UTC
Description of problem:
* these messages also belong to the group of audit messages closely related to SELinux

Version-Release number of selected component (if applicable):
policycoreutils-sandbox-2.5-9.el7.x86_64
policycoreutils-python-2.5-9.el7.x86_64
policycoreutils-newrole-2.5-9.el7.x86_64
policycoreutils-devel-2.5-9.el7.x86_64
policycoreutils-gui-2.5-9.el7.x86_64
policycoreutils-2.5-9.el7.x86_64

How reproducible:
* always

Steps to Reproduce:
# rpm -qla policycoreutils\* | xargs grep -i SELINUX_ERR 2>/dev/null
/usr/lib64/python2.7/site-packages/sepolgen/audit.py:    output = subprocess.Popen(["/sbin/ausearch", "-m", "AVC,USER_AVC,MAC_POLICY_LOAD,DAEMON_START,SELINUX_ERR", "-ts", bootdate, boottime],
/usr/lib64/python2.7/site-packages/sepolgen/audit.py:    output = subprocess.Popen(["/sbin/ausearch", "-m", "AVC,USER_AVC,MAC_POLICY_LOAD,DAEMON_START,SELINUX_ERR"],
Binary file /usr/lib64/python2.7/site-packages/sepolgen/audit.pyc matches
Binary file /usr/lib64/python2.7/site-packages/sepolgen/audit.pyo matches
#

Comment 2 Zdenek Pytela 2019-02-27 13:55:38 UTC
This issue was not selected to be included in Red Hat Enterprise Linux 7.7 because it is seen either as low or moderate impact to a small number of use-cases. The next release will be in Maintenance Support 1 Phase, which means that qualified Critical and Important Security errata advisories (RHSAs) and Urgent Priority Bug Fix errata advisories (RHBAs) may be released as they become available.

We will now close this issue, but if you believe that it qualifies for the Maintenance Support 1 Phase, please re-open; otherwise, we recommend moving the request to Red Hat Enterprise Linux 8 if applicable.


Note You need to log in before you can comment on or make changes to this bug.