On Thu, May 21, 2015 at 10:23 AM, Joshua Brindle <brindle@xxxxxxxxxxxxxxxxx> wrote: > Paul Moore wrote: >> You've got the ioctl numbers in the binary policy, which are the same >> numbers used in the policy representation, which are also the same >> numbers used by applications actually making use of the ioctl() >> syscall. Other than the fact that these things are numbers and not a >> more conventional label string, I don't understand the problem. > > That is precisely the problem. I'd like any extra symbolic information > (e.g., calling this range of ioctls gpu_op) preserved and not thrown away by > m4. > > Some of us work on binary only systems where we don't get to see the source > code of the applications or the policy. Sorry, I keep forgetting you are special. Thanks for the multiple reminders. I suggest talking with James and the CIL folks to arrive at some solution that works well with CIL, whatever that might be. As for the checkpolicy based policy, I think m4 is just fine if folks want to use it; there is no requirement that m4 must be used for this. Further, if we do need to introduce some attribute like construct for these operations/ranges/permissions/whatever-we-call-them, I'm okay adding that in a future patchset, I see no reason to hold up this initial work for that. -- paul moore www.paul-moore.com _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.