Re: [PATCH v4] selinux: support deferred mapping of contexts

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 7 May 2008, Stephen Smalley wrote:

> So the next question is whether there are any other cases where we want
> to use this variant interface.  For example, if
> selinux_inode_getsecurity() were to use this variant interface, then we
> would report the original context string to userspace upon getxattr()
> rather than the unlabeled context, and thus in my example sequence, the
> ls -Z would always show the system_u:object_r:foo_exec_t label on the
> bar file regardless of whether it was defined in the policy.

I wonder if it makes sense to only show the external labels if the process 
has CAP_MAC_ADMIN ?

> I assume we do NOT want to use this variant interface when getting
> contexts to display in audit messages, as we want the audit messages to
> correspond to the actual denial and to yield proper policy if turned
> into an allow rule.

Correct.

> Likewise, are there any other cases where we want to use the reverse
> interface (security_context_to_sid_force) beyond just setxattr and
> fscreate to permit userspace to set undefined contexts on anything else?

Not that I can think of.


-- 
James Morris
<jmorris@xxxxxxxxx>

--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.

[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux