checkpolicy misrepresents the line an error is on

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Here's a neat new issue, (that's i'm not totally sure is an issue) I'll
get to looking at it myself eventually (yes sds, I do realize this is
open source :-P), so don't waste much time on it.

In the base policy below notice I've got user1_u allowed for role1_r but
NOT for role2_r.  I then have a genfscon statement which uses
user1_u:role2_r (illegal)  It bombs, but tells me the wrong line!

[paris@localhost dismod-test]$ checkmodule -M -o base.mod base.conf
checkmodule:  loading policy configuration from base.conf
base.conf:50:ERROR 'invalid security context' at token 'genfscon' on line 50:
genfscon proc /2	user1_u:role1_r:type1_t:s0
genfscon proc /1	user1_u:role2_r:type1_t:s0
checkmodule:  error(s) encountered while parsing configuration

It lays the blame on line 50 which actually has a valid context.

anyway, feel free to tell me the compiler doesn't know its broken until
the first token on the next line and I should just deal with it, but I
know I'd get mad looking at line50 trying to figure out what was wrong
with that valid context when the busted one was on line 49.

---

class class1

sid sid1

class class1
{
	perm1
	perm2
}

sensitivity s0;

dominance { s0 }

category c0; category c1; category c2; category c3;
category c4; category c5; category c6; category c7;
category c8; category c9; category c10; category c11;
category c12; category c13; category c14; category c15;
category c16; category c17; category c18; category c19;
category c20; category c21; category c22; category c23;

level s0:c0.c23;

mlsconstrain class1 { perm1 perm2 }
	( h1 dom h2 );

attribute attr1;

type type1_t;
type type2_t;
role role1_r types { type1_t type2_t };
role role2_r types { type1_t type2_t };

allow type1_t type2_t: class1 { perm1 };

allow role1_r role2_r;

bool bool1 true;

#gen_user(user1_u,, role1_r, s0, s0 - s0:c0.c23)
user user1_u roles { role1_r } level s0 range s0 - s0:c0.c23;

sid sid1	user1_u:role1_r:type1_t:s0


fs_use_xattr ext2 user1_u:role1_r:type1_t:s0;

genfscon proc /		user1_u:role1_r:type1_t:s0
genfscon proc /1	user1_u:role2_r:type1_t:s0
genfscon proc /2	user1_u:role1_r:type1_t:s0

nodecon ::1 FFFF:FFFF:FFFF:FFFF:: user1_u:role1_r:type1_t:s0



--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux