On Tue, Nov 01, 2016 at 08:33:09AM -0400, Daniel J Walsh wrote: > > > On 11/01/2016 08:31 AM, Stephen Smalley wrote: > > On 11/01/2016 07:50 AM, Daniel J Walsh wrote: > >> I wrote a blog http://danwalsh.livejournal.com/75282.html which talks > >> about chrome sandbox and its attempt to change its parents oom_score_adj > >> value. Which is labeled unconfined_t, the question has come up on > >> Twitter to be able to change the label on just this object. > >> > >> I think we discussed this before, but how difficult would it be to > >> change individual file labels under /proc/self/? > > Technically feasible, already on the kernel todo list, > > https://github.com/SELinuxProject/selinux/wiki/Kernel-Todo > > > > However, I agree with Dominick here - the parent shouldn't run in > > unconfined_t in the first place. > > > > _______________________________________________ > > Selinux mailing list > > Selinux@xxxxxxxxxxxxx > > To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. > > To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx. > > > > > Sure, We could label chrome to run as some other label,but then you end > up in multiple unconfined domains > running, or end up attempting to confine chrome, which is a loosing > battle, in the general use case. We have chrome and firefox confined in gentoo and have no problems. There are a set of booleans to allow it to read/write the entire homedir vs just ~/Downloads/ if you want that on. if you skipped the booleans and just give chromium_t userdom_manage_* then its pretty unconfined and would work out of the box. Even if we had a way to set the label on just that one file, it'd still be unconfined_oom_score_t and then the sandbox would still be able to set it on every single process running in unconfined so theres no benefit anyway. https://gitweb.gentoo.org/proj/hardened-refpolicy.git/tree/policy/modules/contrib/chromium.te#n331 meriadoc ~ # semanage boolean -l | grep chrom chromium_bind_tcp_unreserved_ports (on , on) Allow chromium to bind to tcp ports chromium_manage_all_user_content (off , off) Allow chromium to manage all user content (including content that is specific to an application, such as the configuration files of other applications in the users home directory). chromium_manage_generic_user_content (off , off) Allow chromium to manage generic user content (i.e. content that is not specific to an application). chromium_read_all_user_content (off , off) Allow chromium to read all user content (including content that is specific to an application, such as the configuration files of other applications in the users home directory). chromium_read_generic_user_content (on , on) Allow chromium to read generic user content (i.e. content that is not specific to an application). chromium_read_system_info (on , on) Allow chromium to read system information chromium_rw_usb_dev (on , on) Allow chromium to read/write USB devices chromium_use_java (off , off) Allow the use of java plugins -- Jason _______________________________________________ Selinux mailing list Selinux@xxxxxxxxxxxxx To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx. To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.