Ethan,
For a list of Objects Classes you can assign and work with in SELinux
please refer to this page:
http://selinuxproject.org/page/ObjectClassesPerms
It all comes down to how you tag Video Over IP, in example using udp_socket
Best,
Patrick K.
On 2/25/2011 10:51 PM, Ethan Heidrick wrote:
Hello,
I have a similar question concerning the considerations of applying the
debug patch after implementing SeLinux policies, where return object
classes become invalid when applying tagging to TV data modulation over
IP or more specifically over [selected] cables. The modulation exchange
seems to be creating a buffer value that is not readable on the /sys
level and in structuring bypasses the SeLinux implementation. Is there
options regarding defining these values in policies being conducted?
thanks
ethan
On Fri, Feb 25, 2011 at 9:18 AM, Justin Mattock <justinmattock@xxxxxxxxx
<mailto:justinmattock@xxxxxxxxx>> wrote:
On Feb 25, 2011, at 6:07 AM, Stephen Smalley wrote:
On Thu, 2011-02-24 at 12:57 -0800, Justin Mattock wrote:
this just popped up..:
[29804.908327] SELinux: Invalid class 3588
[29804.908438] ------------[ cut here ]------------
[29804.908443] kernel BUG at security/selinux/avc.c:162!
It might help debugging to get as much of the AVC message as we
can even
in this case, e.g.
cool, thanks for the debug patch... I applied it, and will run it to
see if this fires off..
current kernel is: 2.6.38-rc6-00116-g2821f46
diff --git a/security/selinux/avc.c b/security/selinux/avc.c
index 9da6420..8c0ad28 100644
--- a/security/selinux/avc.c
+++ b/security/selinux/avc.c
@@ -111,6 +111,11 @@ static void avc_dump_av(struct audit_buffer
*ab, u16 tclass, u32 av)
return;
}
+ if (tclass >= ARRAY_SIZE(secclass_map)) {
+ audit_log_format(ab, " 0x%x", av);
+ return;
+ }
+
perms = secclass_map[tclass-1].perms;
audit_log_format(ab, " {");
@@ -159,8 +164,10 @@ static void avc_dump_query(struct
audit_buffer *ab, u32 ssid, u32 tsid, u16 tcla
kfree(scontext);
}
- BUG_ON(tclass >= ARRAY_SIZE(secclass_map));
- audit_log_format(ab, " tclass=%s",
secclass_map[tclass-1].name);
+ if (tclass < ARRAY_SIZE(secclass_map))
+ audit_log_format(ab, " tclass=%s",
secclass_map[tclass-1].name);
+ else
+ audit_log_format(ab, " tclass=%d", tclass);
}
/**
--
Stephen Smalley
National Security Agency
Justin P. Mattock
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to
majordomo@xxxxxxxxxxxxx <mailto:majordomo@xxxxxxxxxxxxx> with
the words "unsubscribe selinux" without quotes as the message.
--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.