Re: sparc64 kernel won't boot with selinux enabled

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2007-01-15 at 11:43 -0500, Karl MacMillan wrote:
> Tom 'spot' Callaway wrote:
> > I'm working on Aurora, which is a rebuild of Fedora Core for SPARC.
> > Lately, I've been testing with selinux enabled on the targeted policy,
> > but I haven't gotten very far. When I try to boot on a sparc64, I get
> > the following (copied by hand, apologies for any typos, I tried to be
> > accurate):
> > 
> 
> [CC'ing selinux list]
> 
> > EXT3-fs: mounted filesystem with ordered data mode.
> > audit(1168807648.026:2): enforcing=1 old_enforcing=0 auid=4294967295
> > security:  3 users, 6 roles, 1584 types, 172 bools, 1 sens, 1024 cats
> > security:  59 classes, 49650 rules
> > security:  class dccp_socket not defined in policy
> > security:  permission dccp_recv in class node not defined in policy
> > security:  permission dccp_send in class node not defined in policy
> > security:  permission dccp_recv in class netif not defined in policy
> > security:  permission dccp_send in class netif not defined in policy
> 
> Seems that there is a mismatch between your policy and the kernel.
> 
> > SELinux:  Completing initialization
> > SELinux:  Setting up existing superblocks.
> > SELinux: initialized (dev dm-0, type ext3), uses xattr
> > SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
> > SELinux: initialized (dev usbfs, type usbfs), uses genfs_contexts
> > SELinux: initialized (dev selinuxfs, type selinuxfs), uses
> > genfs_contexts
> > SELinux: initialized (dev mqueue, type mqueue), uses transition SIDs
> > SELinux: initialized (dev hugetlbfs, type hugetlbfs), uses
> > genfs_contexts
> > SELinux: initialized (dev devpts, type devpts), uses transition SIDs
> > SELinux: initialized (dev eventpollfs, type eventpollfs), uses task SIDs
> > SELinux: initialized (dev inotifyfs, type inotifyfs), uses
> > genfs_contexts
> > SELinux: initialized (dev tmpfs, type tmpfs), uses transition SIDs
> > SELinux: initialized (dev futexfs, type futexfs), uses genfs_contexts
> > SELinux: initialized (dev pipefs, type pipefs), uses task SIDs
> > SELinux: initialized (dev sockfs, type sockfs), uses task SIDs
> > SELinux: initialized (dev proc, type proc), uses genfs_contexts
> > SELinux: initialized (dev bdev, type bdev), uses genfs_contexts
> > SELinux: initialized (dev rootfs, type rootfs), uses genfs_contexts
> > SELinux: initialized (dev sysfs, type sysfs), uses genfs_contexts
> > audit(1168807652.930:3): policy loaded auid=4294967295
> > audit(1168807653.174:4): avc:  denied  { execmem } for  pid=1
> > comm="init" scontext=system_u:system_r:kernel_t:s0
> > tcontext=system_u:system_r:kernel_t:s0 tclass=process
> > 
> > ...And there it sits, as init is denied. :)
> > 
> 
> Init requiring execmem is surprising to say the least - it certainly 
> doesn't on i386. Are you seeing a lot of execmem denials in the logs? I 
> don't really know what is going on, but there is likely a kernel or 
> compiler / toolchain issue causing overly broad execmem requests.

Compiler / toolchain problem; we've seen the same thing in the past on
ppc32 and ia64, e.g. see
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=178747
Those were ultimately resolved by toolchain changes and rebuilt
userland, but the temporary fix was to disable the exec* checks in the
kernel for those architectures.

> 
> As a work around you can do (after booting into permissive):
> 
> setsebool -P allow_execmem=1
> 
> The next reboot will allow this globally and you may get farther in 
> permissive. You can also change this default in the policy packages.

-- 
Stephen Smalley
National Security Agency

--
fedora-selinux-list mailing list
fedora-selinux-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-selinux-list

[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux