From: dwalsh@redhat.com (Daniel J Walsh)
To: refpolicy@oss.tresys.com
Subject: [refpolicy] roles_unconfineduser.patch
Date: Tue, 29 Sep 2009 15:10:31 -0400 [thread overview]
Message-ID: <4AC25BA7.1060502@redhat.com> (raw)
In-Reply-To: <1254235446.10232.115.camel@gorn.columbia.tresys.com>
On 09/29/2009 10:44 AM, Christopher J. PeBenito wrote:
> On Tue, 2009-09-29 at 09:42 -0400, Daniel J Walsh wrote:
>> On 09/29/2009 09:24 AM, Christopher J. PeBenito wrote:
>>> On Fri, 2009-08-28 at 16:21 -0400, Daniel J Walsh wrote:
>>>> http://people.fedoraproject.org/~dwalsh/SELinux/F12/roles_unconfineduser.patch
>>>>
>>>> Splitting out the unconfineduser policy from the unconfined domain so
>>>> that you can leave unconfined_t but remove unconfined.pp
>>>
>>> I've been thinking about this for a while. I don't have a problem with
>>> this in principle, but I don't see how it would work with two modules.
>>> The way I see it, the unconfineduser module would unconditionally depend
>>> on the unconfined module (which defines what it means to be unconfined),
>>> which would mean you couldn't remove the unconfined module while keeping
>>> the unconfineduser module installed.
>>>
>>
>> The trick I did to make it work is to add a dummy attribute and add another interface,
>>
>>
>>
>> interface(`unconfined_domain',`
>> gen_require(`
>> attribute unconfined_services;
>> ')
>> unconfined_domain_noaudit($1)
>> }
>>
>> unconfined_domain_noaudit has all the rules required for unconfined_domain.
>
> This is the problem, the attribute should be in the _noaudit interface
> instead, which breaks the desired behavior.
>
Huh? Removing the attribute by removing the unconfined.pp causes all domains that used to the unconfined_domain()
interface to no longer be unconfined_domains. The types that linked against the unconfined_domain_noaudit() domain would still be unconfined.
unconfined_domain_noaudit in this case means unconfined_domains that are not services.
kernel_t, rpm_t, unconfined_t. We want these to be unconfined_domains no matter what unconfined_t would be eliminated if you removed unconfineduser.pp
I don't see ways that you can realistically run with out kernel_t and rpm_t being unconfined.
next prev parent reply other threads:[~2009-09-29 19:10 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-08-28 20:21 [refpolicy] roles_unconfineduser.patch Daniel J Walsh
2009-09-29 13:24 ` Christopher J. PeBenito
2009-09-29 13:42 ` Daniel J Walsh
2009-09-29 14:44 ` Christopher J. PeBenito
2009-09-29 19:10 ` Daniel J Walsh [this message]
2009-09-29 19:50 ` Christopher J. PeBenito
2009-09-29 20:01 ` Daniel J Walsh
2009-09-30 7:56 ` Russell Coker
2009-09-30 12:49 ` Daniel J Walsh
-- strict thread matches above, loose matches on Subject: below --
2009-11-12 21:08 Daniel J Walsh
2010-06-02 20:33 Daniel J Walsh
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4AC25BA7.1060502@redhat.com \
--to=dwalsh@redhat.com \
--cc=refpolicy@oss.tresys.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.