Do we have similar issue if we use shell to run other system process in
init?


On 5/9/13 10:24 AM, "Stephen Smalley" <s...@tycho.nsa.gov> wrote:

>On 05/09/2013 10:21 AM, Stephen Smalley wrote:
>> On 05/08/2013 11:38 PM, William Roberts wrote:
>>> So I looked into some abandoned patches I had in my repo and non of
>>>them
>>> were applicable, or really any good :-P. I really think the cleanest
>>> way to
>>> solve this is just set seclabel for anything that uses logwrapper.
>>> That way
>>> you avoid the compute context issue.
>>
>> Hmm...I was trying to avoid the need to manually specify a seclabel for
>> anything that runs from the system partition, as that is both prone to
>> accidental omission and hardcodes some policy information (the security
>> context) in the init.*.rc files that could get out of sync with the
>> actual policy.  We only do it for the rootfs daemons (adbd and ueventd)
>> because those files are not individually labeled and that seemed
>> manageable as there are only a few such daemons.
>>
>> I guess the question is what is worse:
>> - to require developers to remember to specify a seclabel whenever they
>> use logwrapper for a service, or
>> - to hardcode some knowledge in init about logwrapper and to adjust its
>> context computation in that case to be based on the program launched by
>> logwrapper.
>>
>> Sample patch for the latter attached to help make it concrete.
>
>Note that this approach also avoids the need to make logwrapper an
>entrypoint for the domains.
>
>
>
>--
>This message was distributed to subscribers of the seandroid-list mailing
>list.
>If you no longer wish to subscribe, send mail to majord...@tycho.nsa.gov
>with
>the words "unsubscribe seandroid-list" without quotes as the message.



--
This message was distributed to subscribers of the seandroid-list mailing list.
If you no longer wish to subscribe, send mail to majord...@tycho.nsa.gov with
the words "unsubscribe seandroid-list" without quotes as the message.

Reply via email to