summaryrefslogtreecommitdiff
path: root/security/selinux/hooks.c
diff options
context:
space:
mode:
authorRichard Guy Briggs <rgb@redhat.com>2025-08-07 00:04:07 +0300
committerPaul Moore <paul@paul-moore.com>2025-08-11 18:44:58 +0300
commitce8370e2e62a903e18be7dd0e0be2eee079501e1 (patch)
treea739906f35807c337bc5c327e65fc872c89a5161 /security/selinux/hooks.c
parentdf1145b56c6f92696acec7730694a19fb4c8a174 (diff)
downloadlinux-ce8370e2e62a903e18be7dd0e0be2eee079501e1.tar.xz
audit: record fanotify event regardless of presence of rules
When no audit rules are in place, fanotify event results are unconditionally dropped due to an explicit check for the existence of any audit rules. Given this is a report from another security sub-system, allow it to be recorded regardless of the existence of any audit rules. To test, install and run the fapolicyd daemon with default config. Then as an unprivileged user, create and run a very simple binary that should be denied. Then check for an event with ausearch -m FANOTIFY -ts recent Link: https://issues.redhat.com/browse/RHEL-9065 Signed-off-by: Richard Guy Briggs <rgb@redhat.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'security/selinux/hooks.c')
0 files changed, 0 insertions, 0 deletions