Re: Need to break or reduce the dependency on a static libsepol

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2008-04-01 at 14:27 -0400, David Sugar wrote:
> Steve,
> 
> SLIDE does not have any dependency on libsepol.  But in what we are
> working on for CDS Framework we have recently introduced dependencies on
> the static libsepol.  We need to be able to query the policy to verify
> that any particular allow rules have been put in place.  This is
> specifically important when MLS is enabled to verify that MLS
> constraints are not denying an access.
> 
> I don't remember off the top of my head exactly which functions are
> being used from the static libsepol but I know there were a few things
> that were not exported in the shared object and Josh said to use the
> static version.

Don't know if this helps, but audit2why will tell you whether or not a
denial is due to a constraint violation (not specifically MLS, but any
constraint).  And libselinux now provides a python binding to audit2why.
If you can use that or extend it, then we at least don't add one more
copy of the static libsepol on the system.

> Dave
> 
> On Tue, 2008-04-01 at 08:07 -0400, Stephen Smalley wrote:
> > This is likely my fault, but we're encountering increasing problems from
> > growth in the set of things that depend on the static libsepol whenever
> > we make a change to libsepol, particularly a policy version change.  We
> > now have (at least) the following dependencies on it:
> > checkpolicy (always true, not likely to go away)
> > libselinux (for the audit2why python binding module, which used to be
> > its own utility in policycoreutils)
> > setools
> > 
> > Does slide also have this dependency or is it clean?  Anything else to
> > worry about?
> > 
> > The result is that when a newer libsepol gets incorporated and
> > libselinux or setools does not, we encounter breakage (unable to find a
> > policy file they can read or unable to read the policy file at which
> > they are pointed) or confusion (reading an older policy file left around
> > from before the libsepol update) upon trying to use audit2why or
> > setools.
> > 
> > We ran into this problem twice in rawhide / F9, once upon the policy
> > capability support (policy.22) and now for permissive types (policy.23).
> > 
> > Only real way forward that I can see it to actually encapsulate the
> > interfaces required by audit2why and setools so that they can use the
> > shared libsepol.
> > 
-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux