Re: [PATCH] You can now specify a sebool= flag in seapp_contexts

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 2012-07-27 at 13:37 -0700, William Roberts wrote:
> Their doesn't seem to be consistent formatting in this file
> (libselinux/src/android.c) for multi-line statements, especially in
> regards to selinux_log. What is the style supposed to be, and at what
> width should we start wrapping code at?

Usually we follow Linux kernel coding style (Documentation/CodingStyle
in any kernel tree), which is 80 columns typically but it is all about
readability, so some variance is acceptable.

> 
> On Fri, Jul 27, 2012 at 1:32 PM, William Roberts
> <bill.c.roberts@xxxxxxxxx> wrote:
> > The seapp rule will containing an sebool clause will
> > ONLY be applied on a match to that boolean,
> > and only if the boolean is set to true.
> >
> > Change-Id: Ifdba35cd3a78ce1c8173786514db649203018e28
> > Signed-off-by: William Roberts <w.roberts@xxxxxxxxxxxxxxx>
> > ---
> >  src/android.c |   50 +++++++++++++++++++++++++++++++++++++++++++-------
> >  1 files changed, 43 insertions(+), 7 deletions(-)
> >
> > diff --git a/src/android.c b/src/android.c
> > index 83ba7b7..dbac4f2 100644
> > --- a/src/android.c
> > +++ b/src/android.c
> > @@ -45,6 +45,7 @@ struct seapp_context {
> >         char *domain;
> >         char *type;
> >         char *level;
> > +       char *sebool;
> >         char levelFromUid;
> >  };
> >
> > @@ -85,6 +86,12 @@ static int seapp_context_cmp(const void *A, const void *B)
> >         if (!s1->name && s2->name)
> >                 return 1;
> >
> > +        /* Give precedence to a specified sebool= over an unspecified sebool=. */
> > +        if (s1->sebool && !s2->sebool)
> > +                return -1;
> > +        if (!s1->sebool && s2->sebool)
> > +                return 1;
> > +
> >         /* Anything else has equal precedence. */
> >         return 0;
> >  }
> > @@ -196,6 +203,10 @@ int selinux_android_seapp_context_reload(void)
> >                                 cur->level = strdup(value);
> >                                 if (!cur->level)
> >                                         goto oom;
> > +                       } else if (!strcasecmp(name, "sebool")) {
> > +                               cur->sebool = strdup(value);
> > +                               if (!cur->sebool)
> > +                                       goto oom;
> >                         } else
> >                                 goto err;
> >
> > @@ -217,12 +228,14 @@ int selinux_android_seapp_context_reload(void)
> >                 int i;
> >                 for (i = 0; i < nspec; i++) {
> >                         cur = seapp_contexts[i];
> > -                       selinux_log(SELINUX_INFO, "%s:  isSystemServer=%s user=%s seinfo=%s name=%s -> domain=%s type=%s level=%s levelFromUid=%s",
> > -                                   __FUNCTION__,
> > -                                   cur->isSystemServer ? "true" : "false",
> > -                                   cur->user, cur->seinfo, cur->name,
> > -                                   cur->domain, cur->type, cur->level,
> > -                                   cur->levelFromUid ? "true" : "false");
> > +                       selinux_log(SELINUX_INFO, "%s:  isSystemServer=%s user=%s
> > +                       seinfo=%s name=%s sebool=%s -> domain=%s type=%s level=%s
> > +                       levelFromUid=%s",
> > +                       __FUNCTION__,
> > +                       cur->isSystemServer ? "true" : "false", cur->user,
> > +                       cur->seinfo, cur->name, cur->sebool, cur->domain,
> > +                       cur->type, cur->level,
> > +                       cur->levelFromUid ? "true" : "false");
> >                 }
> >         }
> >  #endif
> > @@ -335,6 +348,17 @@ int selinux_android_setfilecon2(const char *pkgdir,
> >                 if (!cur->type)
> >                         continue;
> >
> > +               if (cur->sebool) {
> > +                       int value = security_get_boolean_active(cur->sebool);
> > +                       if (value == 0)
> > +                               continue;
> > +                       else if (value == -1) {
> > +                               selinux_log(SELINUX_ERROR, \
> > +                               "Could not find boolean: %s ", cur->sebool);
> > +                               goto err;
> > +                       }
> > +               }
> > +
> >                 if (context_type_set(ctx, cur->type))
> >                         goto oom;
> >
> > @@ -348,7 +372,7 @@ int selinux_android_setfilecon2(const char *pkgdir,
> >                         if (context_range_set(ctx, cur->level))
> >                                 goto oom;
> >                 }
> > -
> > +
> >                 break;
> >         }
> >
> > @@ -443,6 +467,7 @@ int selinux_android_setcontext(uid_t uid,
> >
> >         for (i = 0; i < nspec; i++) {
> >                 cur = seapp_contexts[i];
> > +
> >                 if (cur->isSystemServer != isSystemServer)
> >                         continue;
> >                 if (cur->user) {
> > @@ -466,6 +491,17 @@ int selinux_android_setcontext(uid_t uid,
> >                 if (!cur->domain)
> >                         continue;
> >
> > +               if (cur->sebool) {
> > +                       int value = security_get_boolean_active(cur->sebool);
> > +                       if (value == 0)
> > +                               continue;
> > +                       else if (value == -1) {
> > +                               selinux_log(SELINUX_ERROR, \
> > +                               "Could not find boolean: %s ", cur->sebool);
> > +                                goto err;
> > +                        }
> > +                }
> > +
> >                 if (context_type_set(ctx, cur->domain))
> >                         goto oom;
> >
> > --
> > 1.7.0.4
> >
> 
> 
> 

-- 
Stephen Smalley
National Security Agency


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with
the words "unsubscribe selinux" without quotes as the message.


[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux