On Tue, 2005-03-15 at 12:33 -0600, Timothy R. Chavez wrote:
Oops, I was looking at an unpatched auditctl.c (doh!) so I don't
think this is
the problem necessarily, but if you could please verify that you do make it
past audit_netlink_ok(), into audit_watch_insert(), and then print out the
values, that'd help. I'm trying to think of where you'd get invalids. And
you're right, its likely that at least the payload is malformed in some way.
Ah, I think SELinux is stopping it. Even in permissive mode. SELinux
applies a check from the netlink_send() hook, and it doesn't presently
have a mapping for the new audit operations you are introducing, so it
rejects the request as invalid. That security stuff, always getting in
the way ;)
--
Stephen Smalley <sds(a)tycho.nsa.gov>
National Security Agency