On Jul 10, 2015 5:48 AM, "Stephen Smalley" <sds@xxxxxxxxxxxxx> wrote:
>
> On 07/09/2015 07:04 PM, Roberts, William C wrote:
> > I have this problem on Android, but it’s SELinux general. I’d like to
> > get some info from those in the know.
> >
> > If you wanted to be able to execute files off of fuse and have the
> > kernel handle the transition, would it be as simple as having the file
> > system return the getxattr call for the security label?
>
> Aren't fuse mounts mounted with nosuid? That disables SELinux context
> transitions as well as suid/sgid/file-capabilities. Otherwise, the
> kernel is trusting the userspace filesystem to not cause a privilege
> escalation, potentially in excess of the privileges of the userspace
> filesystem daemon itself.
On AOSP yes others no. BTW I'm not condoning doing this either.
>
> Aside from that, you would also need to configure SELinux to use xattrs
> from fuse (i.e. fs_use_xattr fuse ...), and change the daemon to support
> getxattr, and ensure that you do not have the deadlock problem that
> exists with upstream FUSE where it
This old problem, I think if you don't use libfuse you can get around it.
does not support handling a getxattr
> request on the root directory during the mount(2) call. And doing this
> would affect all fuse mounts (e.g. /storage/emulated), not just a
> specific one. There was an attempt to add per-subtype support for
> fs_use so that one could specify a different labeling behavior for a
> specific kind of fuse filesystem, see kernel commit
> 102aefdda4d8275ce7d7100bc16c88c74272b260, but this was reverted in
> 4d546f81717d253ab67643bf072c6d8821a9249c and
> 29b1deb2a48a9dd02b93597aa4c055a24c0e989f as it did not work and caused a
> deadlock for other fuse filesystems.
>
>
>
>
>
>
>
> _______________________________________________
> Selinux mailing list
> Selinux@xxxxxxxxxxxxx
> To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
> To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.
_______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.