I have a similar question concerning the considerations of applying the debug patch after implementing SeLinux policies, where return object classes become invalid when applying tagging to TV data modulation over IP or more specifically over [selected] cables. The modulation exchange seems to be creating a buffer value that is not readable on the /sys level and in structuring bypasses the SeLinux implementation. Is there options regarding defining these values in policies being conducted?
thanks
ethan
On Fri, Feb 25, 2011 at 9:18 AM, Justin Mattock <justinmattock@xxxxxxxxx> wrote:
cool, thanks for the debug patch... I applied it, and will run it to see if this fires off..
On Feb 25, 2011, at 6:07 AM, Stephen Smalley wrote:
On Thu, 2011-02-24 at 12:57 -0800, Justin Mattock wrote:
this just popped up..:
[29804.908327] SELinux: Invalid class 3588
[29804.908438] ------------[ cut here ]------------
[29804.908443] kernel BUG at security/selinux/avc.c:162!
It might help debugging to get as much of the AVC message as we can even
in this case, e.g.
current kernel is: 2.6.38-rc6-00116-g2821f46Justin P. Mattock
diff --git a/security/selinux/avc.c b/security/selinux/avc.c
index 9da6420..8c0ad28 100644
--- a/security/selinux/avc.c
+++ b/security/selinux/avc.c
@@ -111,6 +111,11 @@ static void avc_dump_av(struct audit_buffer *ab, u16 tclass, u32 av)
return;
}
+ if (tclass >= ARRAY_SIZE(secclass_map)) {
+ audit_log_format(ab, " 0x%x", av);
+ return;
+ }
+
perms = secclass_map[tclass-1].perms;
audit_log_format(ab, " {");
@@ -159,8 +164,10 @@ static void avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tcla
kfree(scontext);
}
- BUG_ON(tclass >= ARRAY_SIZE(secclass_map));
- audit_log_format(ab, " tclass=%s", secclass_map[tclass-1].name);
+ if (tclass < ARRAY_SIZE(secclass_map))
+ audit_log_format(ab, " tclass=%s", secclass_map[tclass-1].name);
+ else
+ audit_log_format(ab, " tclass=%d", tclass);
}
/**
--
Stephen Smalley
National Security Agency
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.