From mboxrd@z Thu Jan 1 00:00:00 1970 Message-ID: <5267F222.5010606@tycho.nsa.gov> Date: Wed, 23 Oct 2013 11:58:26 -0400 From: James Carter MIME-Version: 1.0 To: Dominick Grift CC: SELinux List , Steve Lawrence , Richard Haines Subject: Re: Update to CIL References: <52617C02.4060500@tycho.nsa.gov> <1382541329.3041.88.camel@d30> In-Reply-To: <1382541329.3041.88.camel@d30> Content-Type: text/plain; charset=UTF-8; format=flowed Sender: owner-selinux@tycho.nsa.gov List-Id: selinux@tycho.nsa.gov On 10/23/2013 11:15 AM, Dominick Grift wrote: > On Fri, 2013-10-18 at 14:20 -0400, James Carter wrote: >> I pushed an update of CIL to bitbucket. > > I noticed that cilpolicy does not have refpolicies > "selinux_labeled_boolean" interface > This interface causes many problems. First, when trying to convert Refpolicy to CIL, the conversion program tries to infer parameter types (language types, not SELinux types). This interface causes an error because the parameter which is the boolean name is used as both a string and a boolean. Second, the conversion program can't recognize general string concatenation (although it does specifically handle type mangling). Third, CIL does not allow conversion from one language type to another. Fourth, CIL does not have the ability to concatenate strings. All of these problems could probably be worked around, but I would prefer not to have general string concatenation and language type conversions in CIL. This is a perfect example of something that a higher-level language could provide. Although that doesn't help you now. > I tried to implement it myself but i cannot get it to parse ARG2 no > matter what i try > > This is what i currently have: > > macro: > >> ; Associate the specified type and name with booleans >> >> (macro selinux_labeled_boolean ((type ARG1) (name ARG2)) >> (call selinux_boolean_type (ARG1)) >> (genfscon "selinuxfs" ARG2 (system_u object_r ARG1 ((s0) >> (s0))))) > > call: > >> (type secure_mode_insmod_t) >> (call selinux_labeled_boolean (secure_mode_insmod_t >> "/booleans/secure_mode_insmod")) > > result: > >> # seinfo --genfscon | grep secure_mode_insmod >> genfscon selinuxfs ARG2 system_u:object_r:secure_mode_insmod_t > > Is there a work around for this? > Sorry, there is not. > I realize that the nature of cil make these kind of things less useful > but it would have been nice if it worked > > -- James Carter National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with the words "unsubscribe selinux" without quotes as the message.