On Wed, 7 May 2008, Stephen Smalley wrote: > So the next question is whether there are any other cases where we want > to use this variant interface. For example, if > selinux_inode_getsecurity() were to use this variant interface, then we > would report the original context string to userspace upon getxattr() > rather than the unlabeled context, and thus in my example sequence, the > ls -Z would always show the system_u:object_r:foo_exec_t label on the > bar file regardless of whether it was defined in the policy. I wonder if it makes sense to only show the external labels if the process has CAP_MAC_ADMIN ? > I assume we do NOT want to use this variant interface when getting > contexts to display in audit messages, as we want the audit messages to > correspond to the actual denial and to yield proper policy if turned > into an allow rule. Correct. > Likewise, are there any other cases where we want to use the reverse > interface (security_context_to_sid_force) beyond just setxattr and > fscreate to permit userspace to set undefined contexts on anything else? Not that I can think of. -- James Morris <jmorris@xxxxxxxxx> -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.