On Fri, Aug 28, 2015 at 7:27 AM, Dominick Grift <dac.overr...@gmail.com>
wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> On Fri, Aug 28, 2015 at 07:11:21AM -0700, William Roberts wrote:
> > The best solution is to remove it if not needed. Android supports a full
> > udev userspace (full enough). So removing this is the direction I'm
> headed.
> > On Aug 28, 2015 6:24 AM, "Stephen Smalley" <s...@tycho.nsa.gov> wrote:
>
> Sure, but this thread mixes up two topics.
>
> 1. to use devtmpfs or not to use devtmpfs
> 2. support genfscon style labeling for devtmpfs
>
> I was focussing on the second question, and i saw no reason not to
> support genfscon style labeling for devtmpfs, as it would have just
> provided more flexibility and it wouldnt force anyone into anything.
>
> Not that it matters now though. Since it turns out to not be so
> straightforward to add this functionality
>

Yes for the general case. However, this is the specific case of Android,
which I see no great reason to need it.


>
> >
> > > On 08/26/2015 10:07 AM, Dominick Grift wrote:
> > > > On Wed, Aug 26, 2015 at 09:47:31AM -0400, Stephen Smalley wrote:
> > > >
> > > > <snip>
> > > >
> > > >
> > > >> Fedora has tried to work around this by defining name-based type
> > > >> transitions for the kernel domain on /dev to label the device nodes
> > > >> correctly on creation.  However, name-based type transitions aren't
> well
> > > >> suited to that purpose; they only support exact match (no prefix,
> glob,
> > > >> or regex matching), they only match the last component, and they
> were
> > > >> only intended to cover exceptional cases where regular type
> transitions
> > > >> weren't sufficiently granular and one couldn't modify the creating
> > > >> program to explicitly label the file based on file_contexts (so they
> > > >> aren't designed to scale well).  Maybe we could use genfs_contexts
> > > >> instead (i.e. add devtmpfs to the list of filesystems that have
> > > >> SE_SBGENFS set in sbsec->flags, then you can specify path prefixes
> > > >> relative to the root of devtmpfs and label them that way).
> > > >
> > > > This sounds like a good idea to me.
> > >
> > > Unfortunately, I was wrong.  Merely setting SE_SBGENFS in sbsec->flags
> > > for devtmpfs filesystems does NOT enable genfs_context-based labeling
> of
> > > devtmpfs files, because devtmpfs is tmpfs-backed, and tmpfs, like ext4,
> > > calls security_inode_init_security() upon new inode creation to
> > > explicitly initialize the in-core inode security state and to obtain
> the
> > > xattr name/value pair.  That's why type transitions work for devtmpfs
> > > (and tmpfs).  Filesystems that use genfscon-based labeling (e.g. proc,
> > > sysfs, debugfs, pstore) do not support userspace file creation and
> > > therefore do not call that hook and their inode security state is
> > > initialized upon security_d_instantiate(), at which point we have a
> > > dentry and can therefore generate a path relative to the root.
> > > So we can't do this as a one-liner patch; it would be more involved.
> > > devtmpfs/tmpfs does ultimately call d_instantiate() ->
> > > security_d_instantiate(), but at that point the inode security state is
> > > already initialized in the usual way and we therefore don't do anything
> > > further with it.  We would need to rework the way inode security
> > > initialization works, and do it in a way that avoids weird side effects
> > > (e.g. if the policy defines a type transition, as in current Fedora
> > > policy, we don't want to override that with a genfscon-based lookup).
> > > _______________________________________________
> > > Seandroid-list mailing list
> > > Seandroid-list@tycho.nsa.gov
> > > To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov.
> > > To get help, send an email containing "help" to
> > > seandroid-list-requ...@tycho.nsa.gov.
> > >
>
> > _______________________________________________
> > Selinux mailing list
> > seli...@tycho.nsa.gov
> > To unsubscribe, send email to selinux-le...@tycho.nsa.gov.
> > To get help, send an email containing "help" to
> selinux-requ...@tycho.nsa.gov.
>
>
> - --
> 02DFF788
> 4D30 903A 1CF3 B756 FB48  1514 3148 83A2 02DF F788
> http://keys.gnupg.net/pks/lookup?op=vindex&search=0x314883A202DFF788
> Dominick Grift
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2
>
> iQGcBAEBCgAGBQJV4G+7AAoJENAR6kfG5xmc2ZsMAKJ4QmUjoFpDlvvTHe56OzLq
> wFNdebybP7q7D6/5brKuZjLhbrZYXPi+UgJzjy4w8K0T9qaMe0LWX6yHp8hNFwwb
> w0NcJJttJxMtLeH/K5KzDRFHE8qiJwQkhCrcoTecFm/9/Ho08Z1G5v0MjSbrdqKg
> pVkx2ZmzdN2WI6GH+lb7xTXfBUipylqMq7jLDyXPXxBAcjLhVsY+zS+vEcMzCUwr
> eyb6pc2KIEa1jH98gplEToHU24P1SdeJf+AkJZM0pTexb3t/010SQHc2w67um8tA
> +t5vEMp8jQxGIp56YmKqvGFAJChwRskYm/+5ghDcXZmMaSfrYIe1bHUFWbYLxJCV
> sagT45FZBiVYPp/CE0OR8LAciIRnhTe8pb0Nek0US88OPY61n7rxnvpKzn+y2k2i
> r9P6z9O8MygoOxARCDaIaEIPwCe1qbuWShH6vErN45EgL2shE55Jge11TD9U/APM
> aBuEC6J6LJDNIMWfVcVKxM54/UhZCcbQcUOuyEKzbA==
> =sL/v
> -----END PGP SIGNATURE-----
>



-- 
Respectfully,

William C Roberts
_______________________________________________
Seandroid-list mailing list
Seandroid-list@tycho.nsa.gov
To unsubscribe, send email to seandroid-list-le...@tycho.nsa.gov.
To get help, send an email containing "help" to 
seandroid-list-requ...@tycho.nsa.gov.

Reply via email to