For built in commands seclabel obviously is not a factor (I was referencing 
rmdir because that is something we usually invoke as an external command since 
the internal implementation of it does not make any sense).

There have recently been a couple of new exec users that explicitly set the 
seclabel. It may just become a pattern others follow. I shared the concern of 
not unnecessarily specifying the seclabel in the init files, just pointing out 
that there are legitimate uses of besides the ramdisk limitation, so killing it 
entirely would have other consequences. And from this point of view 
exec/service is identical, just difference syntax.

Br, Johan Redestig

-----Original Message-----
From: Stephen Smalley [mailto:s...@tycho.nsa.gov] 
Sent: den 3 juni 2015 15:53
To: Redestig, Johan; 'Roberts, William C'; Nick Kralevich
Cc: Seandroid-list@tycho.nsa.gov
Subject: Re: killing init seclabel

On 06/03/2015 02:56 AM, Redestig, Johan wrote:
> When invoking utilities like rmdir from the init scripts it would still
> be useful to specify in what domain you want them to be executed.
> Alternatively one can wrap all such calls in scripts that are labeled,
> though that seems a bit awkward?

If it is a built-in command, then it will just run in in-process and
thus in init's domain.  If it is an exec, then the new exec command
supports specifying a seclabel as an option to exec.  But that's
different than the service seclabel option that he was talking about
removing, which is used for services whose executables are in the rootfs
or that are shell scripts rather than their own executables.  Shell
script files can be labeled and cause an automatic transition if they
are directly executed but if they are run indirectly via /system/bin/sh
then the kernel will only see it as an exec of sh and a read of the
script file so no transition will occur automatically.





_______________________________________________
Seandroid-list mailing list
Seandroid-list@tycho.nsa.gov
To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov.
To get help, send an email containing "help" to 
seandroid-list-requ...@tycho.nsa.gov.

Reply via email to