Skip to content
  • Laurent Bigonville's avatar
    Initialize audit subsystem even for the session bus · 517c4685
    Laurent Bigonville authored
    If SELinux is enabled on the system, dbus will check the permissions but
    no audit trails will be generated in case of denial as the audit
    subsystem is not initialized. Same should apply for apparmor.
    
    [smcv: without audit, the equivalent of the audit trail goes to stderr
    where it can be picked up by systemd-journald]
    
    A unprivileged user should be able to open the audit socket
    (audit_open()) but should not have the permissions to log an audit
    trail. The CAP_AUDIT_WRITE file capability could be set on the
    dbus-daemon executable in order to allow the session bus to log an AVC
    denial.
    
    Bug: https://bugs.freedesktop.org/show_bug.cgi?id=83856
    
    
    [smcv: s/should/could/ in commit message to reflect lack of consensus that
    "setcap cap_audit_write+ep dbus-daemon" is desirable in general]
    Reviewed-by: default avatarSimon McVittie <simon.mcvittie@collabora.co.uk>
    517c4685