From patchwork Tue Dec 17 13:59:41 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Christian_G=C3=B6ttsche?= X-Patchwork-Id: 13911862 Received: from server02.seltendoof.de (server02.seltendoof.de [168.119.48.163]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C6E651F63C8 for ; Tue, 17 Dec 2024 13:59:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=168.119.48.163 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1734443993; cv=none; b=OAppXoCxhGE0EwXuyEFl+LOp5beWlaM9nERLXY/R03Yq4usLdbY41UtDgv8qfbeT8bPaSTOPG7wjoN9TFiVmjd5MTHXBVUomJJyufRHdT9wNUkH5QBPOaJfHyl9AAgC9w2Zo5GF8UAaEtVTB5tGqlpBaI42hxD70mBZuLcbN5HM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1734443993; c=relaxed/simple; bh=+dmwgXcQvc0CgAPNBg2/vwMLHofWMsy86k11QaohlmE=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=BW/wemT1Bor9e9JJEO99LbeQf5aj8kn5yLB3X9Zj320Ut+64/UjwAFljllj+Zsj1mTQbY4iO1xPb6+uV4rMW2PLWej/vnU4ppb8kt9rB3P2l+QQu8KAwWy3wVVPgBqwcJ1sX26/hnSMDrx/gDNC21XpxN9q/zRsPKMB9OLrW64g= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=seltendoof.de; spf=pass smtp.mailfrom=seltendoof.de; dkim=pass (2048-bit key) header.d=seltendoof.de header.i=@seltendoof.de header.b=eeHjyD5m; arc=none smtp.client-ip=168.119.48.163 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=seltendoof.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=seltendoof.de Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=seltendoof.de header.i=@seltendoof.de header.b="eeHjyD5m" From: =?utf-8?q?Christian_G=C3=B6ttsche?= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=seltendoof.de; s=2023072701; t=1734443987; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=SW6njnvX3XKcOhrWMxYYei52sfXpGhxha5b5S6HureI=; b=eeHjyD5mq3MVLfm6ZjBQ4xmJNWZUZpSxIwY5q5T3Jx5+Bl2ql23lhZOS4CzgrlDTCLRy5T /LcK1WEPtqdi4z3RipN7IxdTjOl/xjl+GBZZ6fkhufPvoHGP7ZSBmx5pTOlMb2ZFNn36Y7 hPYuxLnQ9XgD43Uw0HCAq2RuWj5Olb8bwcYiAXO/yrQ3O/HnuOA8hRpf5tczIpaPUE4ta2 zkmxJPlnKmaEatsJDJmLyZ8GEEzfgwn7JlutF/E2n8MY2l5w09tMwR+fOHjbW9JCqO/dQ2 gE70K+s6XNwIdSPRHUPvc603xPfr7JRBR9DRATJDcp7EJbQLqFBTbQ7W6DLJ4w== To: selinux@vger.kernel.org Cc: =?utf-8?q?Christian_G=C3=B6ttsche?= Subject: [RFC PATCH 1/3] libsepol: update sort order for netifcon definitions Date: Tue, 17 Dec 2024 14:59:41 +0100 Message-ID: <20241217135941.536152-3-cgoettsche@seltendoof.de> In-Reply-To: <20241217135941.536152-1-cgoettsche@seltendoof.de> References: <20241217135941.536152-1-cgoettsche@seltendoof.de> Reply-To: cgzones@googlemail.com Precedence: bulk X-Mailing-List: selinux@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 From: Christian Göttsche Order netifcon definitions with a wildcard interface name last in object contexts, so the kernel tries to match literal names first. Signed-off-by: Christian Göttsche --- libsepol/cil/src/cil_post.c | 36 ++++++++++++++++++++++++++++++--- libsepol/src/kernel_to_common.c | 36 ++++++++++++++++++++++++++++++--- 2 files changed, 66 insertions(+), 6 deletions(-) diff --git a/libsepol/cil/src/cil_post.c b/libsepol/cil/src/cil_post.c index d63a5496..70e5b734 100644 --- a/libsepol/cil/src/cil_post.c +++ b/libsepol/cil/src/cil_post.c @@ -316,10 +316,40 @@ int cil_post_genfscon_compare(const void *a, const void *b) int cil_post_netifcon_compare(const void *a, const void *b) { - struct cil_netifcon *anetifcon = *(struct cil_netifcon**)a; - struct cil_netifcon *bnetifcon = *(struct cil_netifcon**)b; + /* keep in sync with kernel_to_common.c:netif_data_cmp() */ + const struct cil_netifcon *anetifcon = *(struct cil_netifcon**)a; + const struct cil_netifcon *bnetifcon = *(struct cil_netifcon**)b; + const char *a_name = anetifcon->interface_str; + const char *b_name = bnetifcon->interface_str; + size_t a_stem = strcspn(a_name, "*?"); + size_t b_stem = strcspn(b_name, "*?"); + size_t a_len = strlen(a_name); + size_t b_len = strlen(b_name); + int a_iswildcard = a_stem != a_len; + int b_iswildcard = b_stem != b_len; + int rc; + + /* order non-wildcards first */ + rc = spaceship_cmp(a_iswildcard, b_iswildcard); + if (rc) + return rc; + + /* order non-wildcards alphabetically */ + if (!a_iswildcard) + return strcmp(a_name, b_name); + + /* order by decreasing stem length */ + rc = spaceship_cmp(a_stem, b_stem); + if (rc) + return -rc; + + /* order '?' (0x3f) before '*' (0x2A) */ + rc = spaceship_cmp(a_name[a_stem], b_name[b_stem]); + if (rc) + return -rc; - return strcmp(anetifcon->interface_str, bnetifcon->interface_str); + /* order alphabetically */ + return strcmp(a_name, b_name); } int cil_post_ibendportcon_compare(const void *a, const void *b) diff --git a/libsepol/src/kernel_to_common.c b/libsepol/src/kernel_to_common.c index 44f0be23..e4338ec6 100644 --- a/libsepol/src/kernel_to_common.c +++ b/libsepol/src/kernel_to_common.c @@ -441,10 +441,40 @@ static int portcon_data_cmp(const void *a, const void *b) static int netif_data_cmp(const void *a, const void *b) { - struct ocontext *const *aa = a; - struct ocontext *const *bb = b; + /* keep in sync with cil_post.c:cil_post_netifcon_compare() */ + const struct ocontext *const *aa = a; + const struct ocontext *const *bb = b; + const char *a_name = (*aa)->u.name; + const char *b_name = (*bb)->u.name; + size_t a_stem = strcspn(a_name, "*?"); + size_t b_stem = strcspn(b_name, "*?"); + size_t a_len = strlen(a_name); + size_t b_len = strlen(b_name); + int a_iswildcard = a_stem != a_len; + int b_iswildcard = b_stem != b_len; + int rc; - return strcmp((*aa)->u.name, (*bb)->u.name); + /* order non-wildcards first */ + rc = spaceship_cmp(a_iswildcard, b_iswildcard); + if (rc) + return rc; + + /* order non-wildcards alphabetically */ + if (!a_iswildcard) + return strcmp(a_name, b_name); + + /* order by decreasing stem length */ + rc = spaceship_cmp(a_stem, b_stem); + if (rc) + return -rc; + + /* order '?' (0x3f) before '*' (0x2A) */ + rc = spaceship_cmp(a_name[a_stem], b_name[b_stem]); + if (rc) + return -rc; + + /* order alphabetically */ + return strcmp(a_name, b_name); } static int node_data_cmp(const void *a, const void *b) From patchwork Tue Dec 17 13:59:39 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Christian_G=C3=B6ttsche?= X-Patchwork-Id: 13911861 Received: from server02.seltendoof.de (server02.seltendoof.de [168.119.48.163]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6CE861F4732 for ; Tue, 17 Dec 2024 13:59:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=168.119.48.163 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1734443992; cv=none; b=oX9cxRUaSMM2IqwixobcIVpGKUOXPjoPbd3zzYdRqIkJcOTTtCHPckzJNuZ2INsw4X5BqYUrBE6PdfxfcaX49F+vv1wvf/9JdAxuaF5Huoc/x29zZBIR56SWNiJrhNxvGGRwCuacymGKQ7jEXnt1Cicpd5vUOHldrR3TKI1M/8Q= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1734443992; c=relaxed/simple; bh=I9pPNA/c23iGMTwft89PSHf82wrSg8KVrszueYK+GUU=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version:Content-Type; b=lKGq52BnnNcclBe2IixkmmlvhNDICmM19ymACJVMyyLb4fed7ZOoiFOLflunmeGTWaLM8AGb2DRWB3hv/4W/4pMnyBiAq03qqYm6bcocd+WEthsrcGJn9ar/KEfr2iZdJurgfNaQeu1LI26EzCOtFdG3IKgq71v9FHnepEpl0mM= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=seltendoof.de; spf=pass smtp.mailfrom=seltendoof.de; dkim=pass (2048-bit key) header.d=seltendoof.de header.i=@seltendoof.de header.b=eu7y0xeV; arc=none smtp.client-ip=168.119.48.163 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=seltendoof.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=seltendoof.de Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=seltendoof.de header.i=@seltendoof.de header.b="eu7y0xeV" From: =?utf-8?q?Christian_G=C3=B6ttsche?= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=seltendoof.de; s=2023072701; t=1734443986; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=KRGpoGunek2AVF4mDr9tgLrFLuBIKC05Mb+rubSSk/o=; b=eu7y0xeVxelktCzZHRqMcdj1MsbYebjkuxkLnn59ZfFvnRhek0qbpJfnufDQSo8W0kTFTd fT3TcDXbD73eSCRwtJUbxWe86KZBwU0gHHJVmaN8c77Oezr78rR8iXjE5hyw/hqr0wY0n2 QukgWu69K1goktCOsct8YJ4eBGMIh7ClRvn29SaeVzOyC5NFXIuuKvx8hU+ChGy5MeWkap rkhHbxOq8LbYE07KZ7n9e5SyhE6OYy3scf0rjb5h5yq4N0w/nkfM3Xme6iGMysOHbT+VA0 j4X/+Wc0uF6idbDF3CytJPkJjbzF5ThJZVSV4cocoIyvFiQceuUY/E+Hrod/1g== To: selinux@vger.kernel.org Cc: =?utf-8?q?Christian_G=C3=B6ttsche?= Subject: [RFC PATCH 2/3] checkpolicy: add support for wildcard netifcon names Date: Tue, 17 Dec 2024 14:59:39 +0100 Message-ID: <20241217135941.536152-1-cgoettsche@seltendoof.de> Reply-To: cgzones@googlemail.com Precedence: bulk X-Mailing-List: selinux@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 From: Christian Göttsche Support network interface names containing wildcards. Signed-off-by: Christian Göttsche --- checkpolicy/policy_parse.y | 8 +++++++- checkpolicy/policy_scan.l | 1 + checkpolicy/tests/policy_allonce.conf | 1 + checkpolicy/tests/policy_allonce.expected.conf | 1 + checkpolicy/tests/policy_allonce.expected_opt.conf | 1 + 5 files changed, 11 insertions(+), 1 deletion(-) diff --git a/checkpolicy/policy_parse.y b/checkpolicy/policy_parse.y index 7e117222..f9181eaf 100644 --- a/checkpolicy/policy_parse.y +++ b/checkpolicy/policy_parse.y @@ -153,6 +153,7 @@ typedef int (* require_func_t)(int pass); %token POLICYCAP %token PERMISSIVE %token FILESYSTEM +%token NETIFNAME %token DEFAULT_USER DEFAULT_ROLE DEFAULT_TYPE DEFAULT_RANGE %token LOW_HIGH LOW HIGH GLBLUB %token INVALID_CHAR @@ -748,7 +749,7 @@ opt_netif_contexts : netif_contexts netif_contexts : netif_context_def | netif_contexts netif_context_def ; -netif_context_def : NETIFCON identifier security_context_def security_context_def +netif_context_def : NETIFCON netifname security_context_def security_context_def {if (define_netif_context()) YYABORT;} ; opt_node_contexts : node_contexts @@ -901,6 +902,11 @@ path : PATH filename : FILENAME { yytext[strlen(yytext) - 1] = '\0'; if (insert_id(yytext + 1,0)) YYABORT; } ; +netifname : NETIFNAME + { if (insert_id(yytext,0)) YYABORT; } + | IDENTIFIER + { if (insert_id(yytext,0)) YYABORT; } + ; number : NUMBER { unsigned long x; errno = 0; diff --git a/checkpolicy/policy_scan.l b/checkpolicy/policy_scan.l index 5fb9ff37..a7b0d559 100644 --- a/checkpolicy/policy_scan.l +++ b/checkpolicy/policy_scan.l @@ -297,6 +297,7 @@ GLBLUB { return(GLBLUB); } {hexval}{0,4}":"{hexval}{0,4}":"({hexval}|[:.])* { return(IPV6_ADDR); } {hexval}{0,4}":"{hexval}{0,4}":"({hexval}|[:.])*"/"{digit}{1,3} { return(IPV6_CIDR); } {digit}+(\.({alnum}|[_.])*)? { return(VERSION_IDENTIFIER); } +({alnum}({alnum}|[\*\?_]){0,15}|[\*\?]({alnum}|[\*\?_]){1,15}) { return(NETIFNAME); } #line[ ]1[ ]\"[^\n]*\" { set_source_file(yytext+9); } #line[ ]{digit}+ { errno = 0; diff --git a/checkpolicy/tests/policy_allonce.conf b/checkpolicy/tests/policy_allonce.conf index 95a0f265..37482243 100644 --- a/checkpolicy/tests/policy_allonce.conf +++ b/checkpolicy/tests/policy_allonce.conf @@ -74,6 +74,7 @@ genfscon proc "/file1" -- USER1:ROLE1:TYPE1 genfscon proc "/path/to/file" USER1:ROLE1:TYPE1 portcon tcp 80 USER1:ROLE1:TYPE1 portcon udp 100-200 USER1:ROLE1:TYPE1 +netifcon la* USER1:ROLE1:TYPE1 USER1:ROLE1:TYPE1 netifcon lo USER1:ROLE1:TYPE1 USER1:ROLE1:TYPE1 nodecon 127.0.0.1 255.255.255.255 USER1:ROLE1:TYPE1 nodecon 192.168.42.0 255.255.0.0 USER1:ROLE1:TYPE1 diff --git a/checkpolicy/tests/policy_allonce.expected.conf b/checkpolicy/tests/policy_allonce.expected.conf index 79d62319..7bbfffd6 100644 --- a/checkpolicy/tests/policy_allonce.expected.conf +++ b/checkpolicy/tests/policy_allonce.expected.conf @@ -80,6 +80,7 @@ genfscon proc "/path/to/file" USER1:ROLE1:TYPE1 portcon tcp 80 USER1:ROLE1:TYPE1 portcon udp 100-200 USER1:ROLE1:TYPE1 netifcon lo USER1:ROLE1:TYPE1 USER1:ROLE1:TYPE1 +netifcon la* USER1:ROLE1:TYPE1 USER1:ROLE1:TYPE1 nodecon 127.0.0.1 255.255.255.255 USER1:ROLE1:TYPE1 nodecon 127.0.0.0 255.255.255.0 USER1:ROLE1:TYPE1 nodecon 192.168.0.0 255.255.0.0 USER1:ROLE1:TYPE1 diff --git a/checkpolicy/tests/policy_allonce.expected_opt.conf b/checkpolicy/tests/policy_allonce.expected_opt.conf index fa4e319b..3d0afc68 100644 --- a/checkpolicy/tests/policy_allonce.expected_opt.conf +++ b/checkpolicy/tests/policy_allonce.expected_opt.conf @@ -80,6 +80,7 @@ genfscon proc "/path/to/file" USER1:ROLE1:TYPE1 portcon tcp 80 USER1:ROLE1:TYPE1 portcon udp 100-200 USER1:ROLE1:TYPE1 netifcon lo USER1:ROLE1:TYPE1 USER1:ROLE1:TYPE1 +netifcon la* USER1:ROLE1:TYPE1 USER1:ROLE1:TYPE1 nodecon 127.0.0.1 255.255.255.255 USER1:ROLE1:TYPE1 nodecon 127.0.0.0 255.255.255.0 USER1:ROLE1:TYPE1 nodecon 192.168.0.0 255.255.0.0 USER1:ROLE1:TYPE1 From patchwork Tue Dec 17 13:59:40 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Christian_G=C3=B6ttsche?= X-Patchwork-Id: 13911860 Received: from server02.seltendoof.de (server02.seltendoof.de [168.119.48.163]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6F7691F543C for ; Tue, 17 Dec 2024 13:59:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=168.119.48.163 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1734443992; cv=none; b=iVMDOlSa/JqIemFIWEPdf/YAzZMxIf/AW9o947ty1qWT6scN2kqgBvHc6PRe2rM5Ao9THsuWihyXn8ZZS4azG1Uh8Q35Dbx4/DGoVM/aoiD36wRYFqrVPrBRpNNWQgVrGEd+rXxg7LAZIyvMWh4ynWAY36C9ipaDTtLZ1OHTbZ4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1734443992; c=relaxed/simple; bh=DVhsF7mNdL0nd0JOfye7CCVK4J0gc1TbvrBE3kbldEA=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=kGzn5i63T5OR58gElslIzJIogxQCh70KKfGsHFnvi8XUpGOwByr1runAmc96RfqqTRbJVApKAwzV4ylIwnBq3ap5BByuabr7ETNos05TK8PzWx3HdmQUW+OIgfrkQhU1gVBG0kq0Nsv7FUP+93IkBSZYLAK9J2A+xnnge3qC7Eg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=seltendoof.de; spf=pass smtp.mailfrom=seltendoof.de; dkim=pass (2048-bit key) header.d=seltendoof.de header.i=@seltendoof.de header.b=XBnYT0LA; arc=none smtp.client-ip=168.119.48.163 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=seltendoof.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=seltendoof.de Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=seltendoof.de header.i=@seltendoof.de header.b="XBnYT0LA" From: =?utf-8?q?Christian_G=C3=B6ttsche?= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=seltendoof.de; s=2023072701; t=1734443987; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=0y2DNF6/okIlIXfjy5vwRKAX8Gdy3dUzG9VlFB+kdDk=; b=XBnYT0LAfTYNQIS9H/L7eXoK0lHexJ5hEYLhls6Qdz6V7KZGe3/LwcJcv/AdkyfzsTFE4w hspPpdBTm7rHBfWGmuNEgp2jpJlatQ1BDaeSL2i+6YnJvYeE74iyk27mugo5dMpzbj24f0 gKYbau62o6J5bYZkHSQeRs8r7hyA2yypTeW/p16jvFvRerLESZg5UUK4HhgBuUkDyUiUAF zQqHycEONmb/5BXYEjN+YaEgNgMZhr/zmLDws+Czx310BrzsrWj7NByJHX1X/RZNklFpXr e4r214rYDCJKoK6W4QU4H1rxC6ldgf0/jgcxkoj6BNeyvW+8zfBLXA6AmnILQQ== To: selinux@vger.kernel.org Cc: =?utf-8?q?Christian_G=C3=B6ttsche?= Subject: [RFC PATCH 3/3] secilc/test: add test for wildcard netifcon statement Date: Tue, 17 Dec 2024 14:59:40 +0100 Message-ID: <20241217135941.536152-2-cgoettsche@seltendoof.de> In-Reply-To: <20241217135941.536152-1-cgoettsche@seltendoof.de> References: <20241217135941.536152-1-cgoettsche@seltendoof.de> Reply-To: cgzones@googlemail.com Precedence: bulk X-Mailing-List: selinux@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 From: Christian Göttsche Signed-off-by: Christian Göttsche --- secilc/test/policy.cil | 1 + 1 file changed, 1 insertion(+) diff --git a/secilc/test/policy.cil b/secilc/test/policy.cil index d0d52d0d..9761fb4f 100644 --- a/secilc/test/policy.cil +++ b/secilc/test/policy.cil @@ -288,6 +288,7 @@ (portcon sctp (1024 1035) system_u_bin_t_l2h) (genfscon - "/usr/bin" system_u_bin_t_l2h) (netifcon eth0 system_u_bin_t_l2h system_u_bin_t_l2h) ;different contexts? + (netifcon podman* system_u_bin_t_l2h system_u_bin_t_l2h) (fsuse xattr ext3 system_u_bin_t_l2h) ; XEN