All of lore.kernel.org
 help / color / mirror / Atom feed
From: Dominick Grift <dominick.grift@gmail.com>
To: Daniel J Walsh <dwalsh@redhat.com>
Cc: Stephen Smalley <sds@tycho.nsa.gov>, selinux <selinux@tycho.nsa.gov>
Subject: Re: RFC policycoreutils packaging
Date: Mon, 16 Sep 2013 17:38:02 +0200	[thread overview]
Message-ID: <1379345882.6787.76.camel@d30> (raw)
In-Reply-To: <1379345231.6787.72.camel@d30>

On Mon, 2013-09-16 at 17:27 +0200, Dominick Grift wrote:
> On Mon, 2013-09-16 at 11:12 -0400, Daniel J Walsh wrote:
> 
> > > The problem is not just fixing this. SELinux is misunderstood. If 
> > > application developers hook into libselinux but they don't know how they 
> > > should use it then that's the fundamental issue to tackle in my view.
> > > 
> > Yes the tool writers will take the easy way out, but libselinux is not very
> > flexible with this either.  IE Every time a new policy enforcer like systemd
> > or libvirt comes along, libselinux needs to change API.  So giving us
> > flexibility for these tools to define context files structure rather then
> > constantly changing libselinux.
> > 
> > BTW I am not familiar with anything hard coded into systemd or udev.
> > 
> 
> I will look up the hard code issues and enclose them

I don't know what's responsible exactly but these are the hard-coded
contexts, and considering their nature i suspect its either systemd or
udev:

> # dmesg | grep -i selinux | grep -i unmapped
> [    1.453709] SELinux:  Context system_u:object_r:var_run_t:s0 is not valid (left unmapped).
> [    1.453713] SELinux:  Context system_u:object_r:sysfs_t:s0 is not valid (left unmapped).
> [    1.453717] SELinux:  Context system_u:object_r:root_t:s0 is not valid (left unmapped).
> [    1.453721] SELinux:  Context system_u:object_r:device_t:s0 is not valid (left unmapped).
> [    1.555305] SELinux:  Context system_u:object_r:tmp_t:s0 is not valid (left unmapped).
> [    1.918870] SELinux:  Context system_u:object_r:boot_t:s0 is not valid (left unmapped).

I happens pretty much right after the policy is loaded


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  reply	other threads:[~2013-09-16 15:38 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-09-14 13:54 RFC policycoreutils packaging Dominick Grift
2013-09-16 12:07 ` Stephen Smalley
2013-09-16 12:32   ` Dominick Grift
2013-09-16 14:32     ` Daniel J Walsh
2013-09-16 14:54       ` Dominick Grift
2013-09-16 15:12         ` Daniel J Walsh
2013-09-16 15:27           ` Dominick Grift
2013-09-16 15:38             ` Dominick Grift [this message]
2013-09-16 16:21               ` Daniel J Walsh
2013-09-16 15:28         ` Christopher J. PeBenito

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1379345882.6787.76.camel@d30 \
    --to=dominick.grift@gmail.com \
    --cc=dwalsh@redhat.com \
    --cc=sds@tycho.nsa.gov \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.