Issue metadata
Sign in to add a comment
|
Get SELinux log spam out of /var/log/messages |
||||||||||||||||||||||||
Issue description
When I look in /var/log/messages on a Chromebook, it's often full of useless-seeming SELinux audit messages. For example (from a veyron_speedy running 8872.76.0):
2017-01-14T05:29:12.287008-07:00 DEBUG kernel: [31566.234803] SELinux: initialized (dev proc, type proc), uses genfs_contexts
2017-01-14T05:29:13.146906-07:00 NOTICE kernel: [31567.092076] audit: type=1400 audit(1484396953.130:1286): avc: denied { ioctl } for pid=1845 comm="netfilter-queue" path="socket:[318227]" dev="sockfs" ino=318227 ioctlcmd=8910 scontext=u:r:chromeos:s0 tcontext=u:r:chromeos:s0 tclass=unix_dgram_socket permissive=1
2017-01-14T05:29:13.146937-07:00 NOTICE kernel: [31567.092570] audit: type=1400 audit(1484396953.130:1287): avc: denied { ioctl } for pid=1845 comm="netfilter-queue" path="socket:[318229]" dev="sockfs" ino=318229 ioctlcmd=8910 scontext=u:r:chromeos:s0 tcontext=u:r:chromeos:s0 tclass=unix_dgram_socket permissive=1
2017-01-14T05:29:13.156909-07:00 NOTICE kernel: [31567.104273] audit: type=1400 audit(1484396953.140:1288): avc: denied { ioctl } for pid=1845 comm="netfilter-queue" path="socket:[318232]" dev="sockfs" ino=318232 ioctlcmd=8910 scontext=u:r:chromeos:s0 tcontext=u:r:chromeos:s0 tclass=unix_dgram_socket permissive=1
2017-01-14T05:31:15.627548-07:00 NOTICE kernel: [31689.574258] audit: type=1400 audit(1484397075.610:1289): avc: denied { ioctl } for pid=1845 comm="netfilter-queue" path="socket:[323983]" dev="sockfs" ino=323983 ioctlcmd=8910 scontext=u:r:chromeos:s0 tcontext=u:r:chromeos:s0 tclass=unix_dgram_socket permissive=1
Is it straightforward to divert these to a different log file, if we can't disable them entirely?
,
Jan 17 2017
Thanks. I think I possibly see less of this on a ToT kevin device, but there are still bits and pieces:
2017-01-17T09:25:03.085756-07:00 NOTICE kernel: [ 205.925876] audit: type=1400 audit(1484670303.083:17): avc: denied { read } for pid=8704 comm="Binder_2" name="/" dev="tmpfs" ino=29512 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:object_r:device:s0 tclass=dir permissive=0
2017-01-17T09:25:03.153774-07:00 NOTICE kernel: [ 205.994016] audit: type=1400 audit(1484670303.152:18): avc: denied { search } for pid=8704 comm="Binder_2" name="52" dev="proc" ino=34229 scontext=u:r:untrusted_app:s0:c512,c768 tcontext=u:r:zygote:s0 tclass=dir permissive=0
,
Jan 17 2017
Permissive logspam was fixed by djkurtz@ in R56 and R57 ( crbug.com/653575 ). Merge to M55 was not approved. Actual denials still go to /var/log/messages (or logcat). IIRC the previous owner (rickyz@) mentioned it was difficult to move those logs elsewhere. |
|||||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||||
Comment 1 by jorgelo@chromium.org
, Jan 17 2017Status: Assigned (was: Untriaged)